Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-50782 (GCVE-0-2023-50782)
Vulnerability from cvelistv5
- CWE-208 - Observable Timing Discrepancy
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Version: 3.2   ≤ | |||||||||||||||||||||||||||||||||||||||
| 
 | |||||||||||||||||||||||||||||||||||||||
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T22:23:43.327Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vdb-entry",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2023-50782"
          },
          {
            "name": "RHBZ#2254432",
            "tags": [
              "issue-tracking",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254432"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.couchbase.com/alerts/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-50782",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-15T16:14:33.778114Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-17T21:29:24.715Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://github.com/pyca/cryptography",
          "defaultStatus": "unaffected",
          "packageName": "python-cryptography",
          "versions": [
            {
              "lessThan": "42.0.0",
              "status": "affected",
              "version": "3.2",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:ansible_automation_platform:2"
          ],
          "defaultStatus": "unaffected",
          "packageName": "python-cryptography",
          "product": "Red Hat Ansible Automation Platform 2",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:7"
          ],
          "defaultStatus": "unknown",
          "packageName": "python-cryptography",
          "product": "Red Hat Enterprise Linux 7",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:8"
          ],
          "defaultStatus": "affected",
          "packageName": "python39:3.9/python-cryptography",
          "product": "Red Hat Enterprise Linux 8",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:8"
          ],
          "defaultStatus": "affected",
          "packageName": "python-cryptography",
          "product": "Red Hat Enterprise Linux 8",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:9"
          ],
          "defaultStatus": "affected",
          "packageName": "python-cryptography",
          "product": "Red Hat Enterprise Linux 9",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:satellite:6"
          ],
          "defaultStatus": "unaffected",
          "packageName": "python-cryptography",
          "product": "Red Hat Satellite 6",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhui:4::el8"
          ],
          "defaultStatus": "affected",
          "packageName": "python-cryptography",
          "product": "Red Hat Update Infrastructure 4 for Cloud Providers",
          "vendor": "Red Hat"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This issue was discovered by Hubert Kario (Red Hat)."
        }
      ],
      "datePublic": "2023-12-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-208",
              "description": "Observable Timing Discrepancy",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-12T20:02:35.058Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2023-50782"
        },
        {
          "name": "RHBZ#2254432",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254432"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2023-12-13T00:00:00+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2023-12-13T00:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659",
      "workarounds": [
        {
          "lang": "en",
          "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
        }
      ],
      "x_redhatCweChain": "CWE-327-\u003eCWE-385-\u003eCWE-208: Use of a Broken or Risky Cryptographic Algorithm leads to Covert Timing Channel leads to Observable Timing Discrepancy"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2023-50782",
    "datePublished": "2024-02-05T20:45:49.705Z",
    "dateReserved": "2023-12-13T20:44:02.023Z",
    "dateUpdated": "2025-09-12T20:02:35.058Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-50782\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-02-05T21:15:11.183\",\"lastModified\":\"2024-11-21T08:37:18.337\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en el paquete python-cryptography. Este problema puede permitir que un atacante remoto descifre mensajes capturados en servidores TLS que utilizan intercambios de claves RSA, lo que puede provocar la exposici\u00f3n de datos confidenciales o sensibles.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-208\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-203\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B4BE2D6-43C3-4065-A213-5DB1325DC78F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:update_infrastructure:4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8D92E10-0E79-479F-A963-5657D1BC4E03\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cryptography.io:cryptography:*:*:*:*:*:python:*:*\",\"versionEndExcluding\":\"42.0.0\",\"matchCriteriaId\":\"A7B7EA1D-8C2A-4C40-B9FC-E83F4E87C62B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:couchbase:couchbase_server:7.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE39595E-F4B2-4CEC-A405-809B75E71E36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:couchbase:couchbase_server:7.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B84B0C96-07C4-44ED-A291-94CEAAF6FFB6\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-50782\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2254432\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-50782\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2254432\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.couchbase.com/alerts/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://access.redhat.com/security/cve/CVE-2023-50782\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2254432\", \"name\": \"RHBZ#2254432\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://www.couchbase.com/alerts/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T22:23:43.327Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-50782\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-15T16:14:33.778114Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-17T21:24:31.086Z\"}}], \"cna\": {\"title\": \"Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659\", \"credits\": [{\"lang\": \"en\", \"value\": \"This issue was discovered by Hubert Kario (Red Hat).\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"3.2\", \"lessThan\": \"42.0.0\", \"versionType\": \"semver\"}], \"packageName\": \"python-cryptography\", \"collectionURL\": \"https://github.com/pyca/cryptography\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:ansible_automation_platform:2\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Ansible Automation Platform 2\", \"packageName\": \"python-cryptography\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"python-cryptography\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"python39:3.9/python-cryptography\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"python-cryptography\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"python-cryptography\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:satellite:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Satellite 6\", \"packageName\": \"python-cryptography\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:rhui:4::el8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Update Infrastructure 4 for Cloud Providers\", \"packageName\": \"python-cryptography\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-12-13T00:00:00+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2023-12-13T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2023-12-13T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/security/cve/CVE-2023-50782\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2254432\", \"name\": \"RHBZ#2254432\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-208\", \"description\": \"Observable Timing Discrepancy\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-09-12T20:02:35.058Z\"}, \"x_redhatCweChain\": \"CWE-327-\u003eCWE-385-\u003eCWE-208: Use of a Broken or Risky Cryptographic Algorithm leads to Covert Timing Channel leads to Observable Timing Discrepancy\"}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-50782\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-12T20:02:35.058Z\", \"dateReserved\": \"2023-12-13T20:44:02.023Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2024-02-05T20:45:49.705Z\", \"assignerShortName\": \"redhat\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  msrc_cve-2023-50782
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2023-50782 Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659 - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2023-50782.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659",
    "tracking": {
      "current_release_date": "2024-06-30T07:00:00.000Z",
      "generator": {
        "date": "2025-10-20T01:03:24.911Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2023-50782",
      "initial_release_date": "2024-02-02T08:00:00.000Z",
      "revision_history": [
        {
          "date": "2024-06-30T07:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              },
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 python-cryptography 3.3.2-7",
                "product": {
                  "name": "\u003ccbl2 python-cryptography 3.3.2-7",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 python-cryptography 3.3.2-7",
                "product": {
                  "name": "cbl2 python-cryptography 3.3.2-7",
                  "product_id": "20054"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 python-cryptography 3.3.2-5",
                "product": {
                  "name": "\u003cazl3 python-cryptography 3.3.2-5",
                  "product_id": "3"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 python-cryptography 3.3.2-5",
                "product": {
                  "name": "azl3 python-cryptography 3.3.2-5",
                  "product_id": "17984"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 python-cryptography 42.0.5-1",
                "product": {
                  "name": "\u003cazl3 python-cryptography 42.0.5-1",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 python-cryptography 42.0.5-1",
                "product": {
                  "name": "azl3 python-cryptography 42.0.5-1",
                  "product_id": "18171"
                }
              }
            ],
            "category": "product_name",
            "name": "python-cryptography"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 python-cryptography 3.3.2-7 as a component of CBL Mariner 2.0",
          "product_id": "17086-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 python-cryptography 3.3.2-7 as a component of CBL Mariner 2.0",
          "product_id": "20054-17086"
        },
        "product_reference": "20054",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 python-cryptography 3.3.2-5 as a component of Azure Linux 3.0",
          "product_id": "17084-3"
        },
        "product_reference": "3",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 python-cryptography 3.3.2-5 as a component of Azure Linux 3.0",
          "product_id": "17984-17084"
        },
        "product_reference": "17984",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 python-cryptography 42.0.5-1 as a component of Azure Linux 3.0",
          "product_id": "17084-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 python-cryptography 42.0.5-1 as a component of Azure Linux 3.0",
          "product_id": "18171-17084"
        },
        "product_reference": "18171",
        "relates_to_product_reference": "17084"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "general",
          "text": "redhat",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "20054-17086",
          "17984-17084",
          "18171-17084"
        ],
        "known_affected": [
          "17086-1",
          "17084-3",
          "17084-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-50782 Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659 - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2023-50782.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-30T07:00:00.000Z",
          "details": "Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-06-30T07:00:00.000Z",
          "details": "42.0.5-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-3",
            "17084-2"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "17086-1",
            "17084-3",
            "17084-2"
          ]
        }
      ],
      "title": "Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659"
    }
  ]
}
  CERTFR-2025-AVI-0309
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Storage Protect | Storage Protect Plus versions 10.1.x antérieures à 10.1.17 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Storage Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.17",
      "product": {
        "name": "Storage Protect",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2023-25577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
    },
    {
      "name": "CVE-2023-52448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
    },
    {
      "name": "CVE-2024-36974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
    },
    {
      "name": "CVE-2023-1076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1076"
    },
    {
      "name": "CVE-2024-12797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2024-26603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
    },
    {
      "name": "CVE-2023-4091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
    },
    {
      "name": "CVE-2024-56326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2023-23934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
    },
    {
      "name": "CVE-2024-2466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-52492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
    },
    {
      "name": "CVE-2024-34069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2024-36881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36881"
    },
    {
      "name": "CVE-2023-42669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
    },
    {
      "name": "CVE-2022-36280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
    },
    {
      "name": "CVE-2023-1409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1409"
    },
    {
      "name": "CVE-2023-52475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
    },
    {
      "name": "CVE-2024-7553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7553"
    },
    {
      "name": "CVE-2020-25659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
    },
    {
      "name": "CVE-2023-6240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2023-23931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
    },
    {
      "name": "CVE-2024-26782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26782"
    },
    {
      "name": "CVE-2024-8207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8207"
    },
    {
      "name": "CVE-2024-2379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2379"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-3372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3372"
    },
    {
      "name": "CVE-2024-26803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
    },
    {
      "name": "CVE-2024-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
    },
    {
      "name": "CVE-2024-36882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
    },
    {
      "name": "CVE-2023-46136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
    },
    {
      "name": "CVE-2023-52439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
    },
    {
      "name": "CVE-2023-38325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-56201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
    },
    {
      "name": "CVE-2023-3961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3961"
    },
    {
      "name": "CVE-2024-0841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2024-41042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-1151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
    },
    {
      "name": "CVE-2024-26646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26646"
    },
    {
      "name": "CVE-2020-36242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
    },
    {
      "name": "CVE-2024-36015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-52434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2023-52458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
    },
    {
      "name": "CVE-2024-26602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
    },
    {
      "name": "CVE-2023-52466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52466"
    },
    {
      "name": "CVE-2024-26591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
    },
    {
      "name": "CVE-2024-26611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
    },
    {
      "name": "CVE-2023-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2024-0340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
    },
    {
      "name": "CVE-2024-35995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
    }
  ],
  "initial_release_date": "2025-04-11T00:00:00",
  "last_revision_date": "2025-04-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0309",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2025-04-10",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7230557",
      "url": "https://www.ibm.com/support/pages/node/7230557"
    }
  ]
}
  CERTFR-2024-AVI-0958
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.x antérieures à 2.3.4.1 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.13 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.2 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | AIX | AIX version 7.3 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.3 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 IF01 | ||
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.0 avec Db2 versions antérieures à 11.5.9 Special Build | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.3.1.x antérieures à 6.3.1.0 iFix03 | ||
| IBM | VIOS | VIOS version 3.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.27.0 | ||
| IBM | Cloud Transformation Advisor | Cloud Transformation Advisor versions antérieures à 3.10.2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions antérieures à 1.10.27.0 | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.2.1.x antérieures à 6.2.1.0 iFix14 | ||
| IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.15 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cloud Pak System versions 2.3.4.x ant\u00e9rieures \u00e0 2.3.4.1",
      "product": {
        "name": "Cloud Pak System",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "VIOS version 4.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
      "product": {
        "name": "VIOS",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.13",
      "product": {
        "name": "Security QRadar EDR",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "VIOS version 4.1 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
      "product": {
        "name": "VIOS",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX version 7.2 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX version 7.3 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX version 7.3 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10 IF01",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Pak System versions 2.3.4.0 avec Db2 versions ant\u00e9rieures \u00e0 11.5.9 Special Build",
      "product": {
        "name": "Cloud Pak System",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Control Center versions 6.3.1.x ant\u00e9rieures \u00e0 6.3.1.0 iFix03",
      "product": {
        "name": "Sterling Control Center",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "VIOS version 3.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
      "product": {
        "name": "VIOS",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.27.0",
      "product": {
        "name": "Cloud Pak",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Transformation Advisor versions ant\u00e9rieures \u00e0 3.10.2 ",
      "product": {
        "name": "Cloud Transformation Advisor",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.27.0",
      "product": {
        "name": "QRadar Suite Software",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Control Center versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.0 iFix14",
      "product": {
        "name": "Sterling Control Center",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.15",
      "product": {
        "name": "QRadar Deployment Intelligence App",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2020-25659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
    },
    {
      "name": "CVE-2020-36242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
    },
    {
      "name": "CVE-2022-23181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23181"
    },
    {
      "name": "CVE-2021-42340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
    },
    {
      "name": "CVE-2022-29885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
    },
    {
      "name": "CVE-2022-34305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34305"
    },
    {
      "name": "CVE-2017-7500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
    },
    {
      "name": "CVE-2022-25762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
    },
    {
      "name": "CVE-2022-42252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42252"
    },
    {
      "name": "CVE-2022-40897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-23931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
    },
    {
      "name": "CVE-2023-28708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28708"
    },
    {
      "name": "CVE-2022-24999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-38325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2021-43618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-28487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
    },
    {
      "name": "CVE-2022-23471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
    },
    {
      "name": "CVE-2023-28486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
    },
    {
      "name": "CVE-2023-25153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
    },
    {
      "name": "CVE-2023-7104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2023-25173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
    },
    {
      "name": "CVE-2022-31030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
    },
    {
      "name": "CVE-2022-23648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
    },
    {
      "name": "CVE-2023-28746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
    },
    {
      "name": "CVE-2023-52451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
    },
    {
      "name": "CVE-2023-52584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
    },
    {
      "name": "CVE-2023-52469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
    },
    {
      "name": "CVE-2023-52600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
    },
    {
      "name": "CVE-2023-52463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
    },
    {
      "name": "CVE-2023-52599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
    },
    {
      "name": "CVE-2023-42465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
    },
    {
      "name": "CVE-2023-52530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
    },
    {
      "name": "CVE-2024-26586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2023-36632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
    },
    {
      "name": "CVE-2023-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
    },
    {
      "name": "CVE-2023-2253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
    },
    {
      "name": "CVE-2024-2201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
    },
    {
      "name": "CVE-2023-52609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
    },
    {
      "name": "CVE-2017-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2021-35939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2024-0553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
    },
    {
      "name": "CVE-2021-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2021-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2023-52591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
    },
    {
      "name": "CVE-2024-26667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26667"
    },
    {
      "name": "CVE-2023-52608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
    },
    {
      "name": "CVE-2023-52486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
    },
    {
      "name": "CVE-2024-26614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
    },
    {
      "name": "CVE-2024-25739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
    },
    {
      "name": "CVE-2023-52623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
    },
    {
      "name": "CVE-2023-52619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
    },
    {
      "name": "CVE-2024-29133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
    },
    {
      "name": "CVE-2024-29131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
    },
    {
      "name": "CVE-2024-26707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
    },
    {
      "name": "CVE-2024-26697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
    },
    {
      "name": "CVE-2024-26704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
    },
    {
      "name": "CVE-2023-52622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
    },
    {
      "name": "CVE-2024-26727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26727"
    },
    {
      "name": "CVE-2024-26718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26718"
    },
    {
      "name": "CVE-2024-26702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
    },
    {
      "name": "CVE-2024-26710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26710"
    },
    {
      "name": "CVE-2024-26810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
    },
    {
      "name": "CVE-2024-26663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
    },
    {
      "name": "CVE-2024-26773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
    },
    {
      "name": "CVE-2024-26660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
    },
    {
      "name": "CVE-2024-26726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
    },
    {
      "name": "CVE-2024-26640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
    },
    {
      "name": "CVE-2024-26802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
    },
    {
      "name": "CVE-2024-26733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
    },
    {
      "name": "CVE-2024-26700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
    },
    {
      "name": "CVE-2024-26772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
    },
    {
      "name": "CVE-2024-26696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
    },
    {
      "name": "CVE-2024-26698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
    },
    {
      "name": "CVE-2024-26714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2017-11468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11468"
    },
    {
      "name": "CVE-2023-45284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
    },
    {
      "name": "CVE-2023-52590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
    },
    {
      "name": "CVE-2021-46939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46939"
    },
    {
      "name": "CVE-2024-26870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26870"
    },
    {
      "name": "CVE-2024-27025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
    },
    {
      "name": "CVE-2024-26961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
    },
    {
      "name": "CVE-2024-26840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
    },
    {
      "name": "CVE-2024-26958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26958"
    },
    {
      "name": "CVE-2024-26843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
    },
    {
      "name": "CVE-2024-26925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
    },
    {
      "name": "CVE-2024-27388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
    },
    {
      "name": "CVE-2024-27020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
    },
    {
      "name": "CVE-2024-26960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
    },
    {
      "name": "CVE-2024-26820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
    },
    {
      "name": "CVE-2024-26878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26878"
    },
    {
      "name": "CVE-2024-26852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
    },
    {
      "name": "CVE-2024-27065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
    },
    {
      "name": "CVE-2024-26825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
    },
    {
      "name": "CVE-2024-27019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
    },
    {
      "name": "CVE-2024-26668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
    },
    {
      "name": "CVE-2024-26669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2024-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2023-52653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
    },
    {
      "name": "CVE-2024-26853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
    },
    {
      "name": "CVE-2022-48632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
    },
    {
      "name": "CVE-2024-29025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
    },
    {
      "name": "CVE-2024-35947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
    },
    {
      "name": "CVE-2024-36017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
    },
    {
      "name": "CVE-2024-36886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
    },
    {
      "name": "CVE-2024-36889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
    },
    {
      "name": "CVE-2024-36904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
    },
    {
      "name": "CVE-2024-36905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
    },
    {
      "name": "CVE-2024-36929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
    },
    {
      "name": "CVE-2024-36933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
    },
    {
      "name": "CVE-2024-36940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
    },
    {
      "name": "CVE-2024-36941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
    },
    {
      "name": "CVE-2024-36950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
    },
    {
      "name": "CVE-2024-36954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
    },
    {
      "name": "CVE-2021-47231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47231"
    },
    {
      "name": "CVE-2021-47284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47284"
    },
    {
      "name": "CVE-2021-47373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
    },
    {
      "name": "CVE-2021-47408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47408"
    },
    {
      "name": "CVE-2021-47449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47449"
    },
    {
      "name": "CVE-2021-47461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47461"
    },
    {
      "name": "CVE-2021-47468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
    },
    {
      "name": "CVE-2021-47491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47491"
    },
    {
      "name": "CVE-2021-47548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47548"
    },
    {
      "name": "CVE-2023-52662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
    },
    {
      "name": "CVE-2023-52679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
    },
    {
      "name": "CVE-2023-52707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52707"
    },
    {
      "name": "CVE-2023-52730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
    },
    {
      "name": "CVE-2023-52756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52756"
    },
    {
      "name": "CVE-2023-52764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
    },
    {
      "name": "CVE-2023-52777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52777"
    },
    {
      "name": "CVE-2023-52791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
    },
    {
      "name": "CVE-2023-52796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
    },
    {
      "name": "CVE-2023-52803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
    },
    {
      "name": "CVE-2023-52811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
    },
    {
      "name": "CVE-2023-52817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
    },
    {
      "name": "CVE-2023-52832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
    },
    {
      "name": "CVE-2023-52834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
    },
    {
      "name": "CVE-2023-52847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
    },
    {
      "name": "CVE-2023-52864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
    },
    {
      "name": "CVE-2024-26921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
    },
    {
      "name": "CVE-2024-26940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26940"
    },
    {
      "name": "CVE-2024-27395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
    },
    {
      "name": "CVE-2024-35801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
    },
    {
      "name": "CVE-2024-35823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
    },
    {
      "name": "CVE-2024-35847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
    },
    {
      "name": "CVE-2024-35912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
    },
    {
      "name": "CVE-2024-35924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
    },
    {
      "name": "CVE-2024-35930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
    },
    {
      "name": "CVE-2024-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35938"
    },
    {
      "name": "CVE-2024-35940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35940"
    },
    {
      "name": "CVE-2024-35952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
    },
    {
      "name": "CVE-2024-36006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
    },
    {
      "name": "CVE-2024-36016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
    },
    {
      "name": "CVE-2024-36896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2023-52658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
    },
    {
      "name": "CVE-2024-26740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
    },
    {
      "name": "CVE-2024-26844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
    },
    {
      "name": "CVE-2024-26962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26962"
    },
    {
      "name": "CVE-2024-27434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2024-35810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
    },
    {
      "name": "CVE-2024-35814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
    },
    {
      "name": "CVE-2024-35824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
    },
    {
      "name": "CVE-2024-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
    },
    {
      "name": "CVE-2024-35946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
    },
    {
      "name": "CVE-2024-36020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
    },
    {
      "name": "CVE-2024-36025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
    },
    {
      "name": "CVE-2024-36921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
    },
    {
      "name": "CVE-2024-31076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
    },
    {
      "name": "CVE-2024-33621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
    },
    {
      "name": "CVE-2024-35807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
    },
    {
      "name": "CVE-2024-35893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
    },
    {
      "name": "CVE-2024-35896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
    },
    {
      "name": "CVE-2024-35897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35897"
    },
    {
      "name": "CVE-2024-35899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
    },
    {
      "name": "CVE-2024-35900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
    },
    {
      "name": "CVE-2024-35910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
    },
    {
      "name": "CVE-2024-35925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
    },
    {
      "name": "CVE-2024-36005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
    },
    {
      "name": "CVE-2024-36286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
    },
    {
      "name": "CVE-2024-36960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
    },
    {
      "name": "CVE-2024-36971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
    },
    {
      "name": "CVE-2024-38596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
    },
    {
      "name": "CVE-2024-38598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
    },
    {
      "name": "CVE-2024-38627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
    },
    {
      "name": "CVE-2023-5752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2023-52648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
    },
    {
      "name": "CVE-2023-6004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
    },
    {
      "name": "CVE-2023-6918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2024-34069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2022-48743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
    },
    {
      "name": "CVE-2022-48747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48747"
    },
    {
      "name": "CVE-2023-52762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
    },
    {
      "name": "CVE-2023-52784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
    },
    {
      "name": "CVE-2023-52845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
    },
    {
      "name": "CVE-2024-26842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
    },
    {
      "name": "CVE-2024-36917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
    },
    {
      "name": "CVE-2024-36945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
    },
    {
      "name": "CVE-2024-36978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
    },
    {
      "name": "CVE-2024-38555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
    },
    {
      "name": "CVE-2024-38573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2024-21131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
    },
    {
      "name": "CVE-2024-21138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
    },
    {
      "name": "CVE-2024-21140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
    },
    {
      "name": "CVE-2024-21144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
    },
    {
      "name": "CVE-2024-21145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
    },
    {
      "name": "CVE-2024-21147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
    },
    {
      "name": "CVE-2024-26662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
    },
    {
      "name": "CVE-2024-26703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26703"
    },
    {
      "name": "CVE-2024-26818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
    },
    {
      "name": "CVE-2024-26824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26824"
    },
    {
      "name": "CVE-2024-26831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
    },
    {
      "name": "CVE-2024-27010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
    },
    {
      "name": "CVE-2024-27011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
    },
    {
      "name": "CVE-2024-36270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
    },
    {
      "name": "CVE-2024-36489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
    },
    {
      "name": "CVE-2024-38615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
    },
    {
      "name": "CVE-2024-39276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
    },
    {
      "name": "CVE-2024-39476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
    },
    {
      "name": "CVE-2024-39487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
    },
    {
      "name": "CVE-2024-39495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
    },
    {
      "name": "CVE-2024-39502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
    },
    {
      "name": "CVE-2024-40902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
    },
    {
      "name": "CVE-2024-40927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
    },
    {
      "name": "CVE-2024-40974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
    },
    {
      "name": "CVE-2024-36010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
    },
    {
      "name": "CVE-2024-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    },
    {
      "name": "CVE-2024-36000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
    },
    {
      "name": "CVE-2024-36927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
    },
    {
      "name": "CVE-2024-36979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
    },
    {
      "name": "CVE-2024-38538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
    },
    {
      "name": "CVE-2021-47018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47018"
    },
    {
      "name": "CVE-2021-47257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47257"
    },
    {
      "name": "CVE-2021-47304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47304"
    },
    {
      "name": "CVE-2021-47579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
    },
    {
      "name": "CVE-2021-47624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47624"
    },
    {
      "name": "CVE-2022-48757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
    },
    {
      "name": "CVE-2023-52471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52471"
    },
    {
      "name": "CVE-2023-52775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
    },
    {
      "name": "CVE-2024-26837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
    },
    {
      "name": "CVE-2024-39472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2024-38808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
    },
    {
      "name": "CVE-2024-38809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
    },
    {
      "name": "CVE-2024-27267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
    },
    {
      "name": "CVE-2024-38428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
    },
    {
      "name": "CVE-2024-42232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
    },
    {
      "name": "CVE-2024-42236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
    },
    {
      "name": "CVE-2024-42244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
    },
    {
      "name": "CVE-2024-42247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
    },
    {
      "name": "CVE-2023-4692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
    },
    {
      "name": "CVE-2023-4693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
    },
    {
      "name": "CVE-2023-7008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
    },
    {
      "name": "CVE-2024-1048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
    },
    {
      "name": "CVE-2024-6232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-39689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
    },
    {
      "name": "CVE-2024-45491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
    },
    {
      "name": "CVE-2024-45492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2024-41042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
    },
    {
      "name": "CVE-2024-42238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
    },
    {
      "name": "CVE-2024-42259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
    },
    {
      "name": "CVE-2024-43824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
    },
    {
      "name": "CVE-2024-43833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
    },
    {
      "name": "CVE-2024-43858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
    },
    {
      "name": "CVE-2021-42694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42694"
    },
    {
      "name": "CVE-2023-50314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
    },
    {
      "name": "CVE-2024-34155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
    },
    {
      "name": "CVE-2024-34156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
    },
    {
      "name": "CVE-2024-34158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
    },
    {
      "name": "CVE-2024-42252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
    },
    {
      "name": "CVE-2024-43832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
    },
    {
      "name": "CVE-2024-37370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2024-42251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
    },
    {
      "name": "CVE-2021-43980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43980"
    },
    {
      "name": "CVE-2023-20584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20584"
    },
    {
      "name": "CVE-2023-31356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31356"
    },
    {
      "name": "CVE-2023-36328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36328"
    },
    {
      "name": "CVE-2023-48161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
    },
    {
      "name": "CVE-2023-5115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5115"
    },
    {
      "name": "CVE-2023-52596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52596"
    },
    {
      "name": "CVE-2023-5764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5764"
    },
    {
      "name": "CVE-2024-21529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21529"
    },
    {
      "name": "CVE-2024-21534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
    },
    {
      "name": "CVE-2024-25620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25620"
    },
    {
      "name": "CVE-2024-26147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26147"
    },
    {
      "name": "CVE-2024-26713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26713"
    },
    {
      "name": "CVE-2024-26721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
    },
    {
      "name": "CVE-2024-26823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26823"
    },
    {
      "name": "CVE-2024-30203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
    },
    {
      "name": "CVE-2024-30205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
    },
    {
      "name": "CVE-2024-31882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31882"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-35136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35136"
    },
    {
      "name": "CVE-2024-35152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35152"
    },
    {
      "name": "CVE-2024-37529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37529"
    },
    {
      "name": "CVE-2024-38286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
    },
    {
      "name": "CVE-2024-39331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
    },
    {
      "name": "CVE-2024-42254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42254"
    },
    {
      "name": "CVE-2024-42255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42255"
    },
    {
      "name": "CVE-2024-42256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42256"
    },
    {
      "name": "CVE-2024-42258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
    },
    {
      "name": "CVE-2024-42460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
    },
    {
      "name": "CVE-2024-43796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
    },
    {
      "name": "CVE-2024-43799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
    },
    {
      "name": "CVE-2024-43800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
    },
    {
      "name": "CVE-2024-43857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43857"
    },
    {
      "name": "CVE-2024-45490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
    },
    {
      "name": "CVE-2024-45590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
    },
    {
      "name": "CVE-2024-45801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
    },
    {
      "name": "CVE-2024-46982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46982"
    },
    {
      "name": "CVE-2024-47764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
    },
    {
      "name": "CVE-2024-47874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
    },
    {
      "name": "CVE-2024-47875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
    },
    {
      "name": "CVE-2024-7592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
    },
    {
      "name": "CVE-2024-8088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
    }
  ],
  "initial_release_date": "2024-11-08T00:00:00",
  "last_revision_date": "2024-11-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0958",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-11-05",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174802",
      "url": "https://www.ibm.com/support/pages/node/7174802"
    },
    {
      "published_at": "2024-11-01",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174634",
      "url": "https://www.ibm.com/support/pages/node/7174634"
    },
    {
      "published_at": "2024-11-01",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174639",
      "url": "https://www.ibm.com/support/pages/node/7174639"
    },
    {
      "published_at": "2024-11-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175196",
      "url": "https://www.ibm.com/support/pages/node/7175196"
    },
    {
      "published_at": "2024-11-07",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175086",
      "url": "https://www.ibm.com/support/pages/node/7175086"
    },
    {
      "published_at": "2024-11-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175192",
      "url": "https://www.ibm.com/support/pages/node/7175192"
    },
    {
      "published_at": "2024-11-05",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174799",
      "url": "https://www.ibm.com/support/pages/node/7174799"
    },
    {
      "published_at": "2024-11-05",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174797",
      "url": "https://www.ibm.com/support/pages/node/7174797"
    },
    {
      "published_at": "2024-11-06",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174945",
      "url": "https://www.ibm.com/support/pages/node/7174945"
    },
    {
      "published_at": "2024-11-05",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174912",
      "url": "https://www.ibm.com/support/pages/node/7174912"
    },
    {
      "published_at": "2024-11-07",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175166",
      "url": "https://www.ibm.com/support/pages/node/7175166"
    }
  ]
}
  CERTFR-2024-AVI-0305
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Sterling Connect:Direct pour UNIX versions 6.1.0.x antérieures à 6.1.0.4.iFix104
- Sterling Connect:Direct pour UNIX versions 6.0.0.x antérieures à 6.0.0.2.iFix163
- Sterling Connect:Direct FTP+ versions antérieures à 1.3.0 sans le correctif de sécurité iFix026
- QRadar App SDK versions 2.2.x antérieures à 2.2.1
- QRadar Deployment Intelligence App versions antérieures à 3.0.13
- Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.20.0
- QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF01
- QRadar Suite Software versions 1.10.12.x antérieures à 1.10.20.0
- WebSphere Application Server Liberty versions postérieures à 21.0.0.2 et antérieures à 24.0.0.4
- WebSphere Application Server versions 9.x antérieures à 9.0.5.19
- WebSphere Application Server versions postérieures à 8.5.5.2 antérieures à 8.5.5.26
- Sterling B2B Integrator versions 6.0.x.x à 6.1.x.x antérieures à 6.1.2.5
- Sterling B2B Integrator versions 6.2.x.x antérieures à 6.2.0.1
Se référer aux bulletin de l'éditeur pour les versions des fichiers vulnérables (cf. section Documentation).
| Vendor | Product | Description | 
|---|
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cul\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.1.0.x ant\u00e9rieures \u00e0\u00a06.1.0.4.iFix104\u003c/li\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.0.2.iFix163\u003c/li\u003e \u003cli\u003eSterling Connect:Direct FTP+ versions ant\u00e9rieures \u00e0 1.3.0 sans le correctif de s\u00e9curit\u00e9 iFix026\u003c/li\u003e \u003cli\u003eQRadar App SDK versions 2.2.x ant\u00e9rieures \u00e0 2.2.1\u003c/li\u003e \u003cli\u003eQRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.13\u003c/li\u003e \u003cli\u003eCloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eQRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF01\u003c/li\u003e \u003cli\u003eQRadar Suite Software versions 1.10.12.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eWebSphere Application Server Liberty versions post\u00e9rieures \u00e0 21.0.0.2 et ant\u00e9rieures \u00e0 24.0.0.4\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions 9.x ant\u00e9rieures \u00e0 9.0.5.19\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions post\u00e9rieures \u00e0 8.5.5.2 ant\u00e9rieures \u00e0 8.5.5.26\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.0.x.x \u00e0 6.1.x.x ant\u00e9rieures \u00e0 6.1.2.5\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux bulletin de l\u0027\u00e9diteur pour les versions des fichiers vuln\u00e9rables (cf. section Documentation).\u003c/p\u003e ",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-20919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
    },
    {
      "name": "CVE-2022-48564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
    },
    {
      "name": "CVE-2024-1597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
    },
    {
      "name": "CVE-2023-43642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-45857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
    },
    {
      "name": "CVE-2023-51385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
    },
    {
      "name": "CVE-2023-46234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2024-20926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
    },
    {
      "name": "CVE-2021-31525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
    },
    {
      "name": "CVE-2023-52426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
    },
    {
      "name": "CVE-2022-45061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
    },
    {
      "name": "CVE-2023-4091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2024-22361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
    },
    {
      "name": "CVE-2024-20921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
    },
    {
      "name": "CVE-2021-35939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2023-42669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
    },
    {
      "name": "CVE-2023-2828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
    },
    {
      "name": "CVE-2023-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
    },
    {
      "name": "CVE-2023-20569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
    },
    {
      "name": "CVE-2012-0881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0881"
    },
    {
      "name": "CVE-2019-13224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
    },
    {
      "name": "CVE-2023-34968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2019-19204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2021-22696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
    },
    {
      "name": "CVE-2023-42795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
    },
    {
      "name": "CVE-2023-28487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
    },
    {
      "name": "CVE-2023-22067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
    },
    {
      "name": "CVE-2023-6135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6135"
    },
    {
      "name": "CVE-2022-46364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2020-28241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28241"
    },
    {
      "name": "CVE-2023-45648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2022-46363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46363"
    },
    {
      "name": "CVE-2023-34967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
    },
    {
      "name": "CVE-2021-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2023-3341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
    },
    {
      "name": "CVE-2021-41043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
    },
    {
      "name": "CVE-2019-16163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
    },
    {
      "name": "CVE-2023-1786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
    },
    {
      "name": "CVE-2024-0553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
    },
    {
      "name": "CVE-2021-30468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30468"
    },
    {
      "name": "CVE-2024-26130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
    },
    {
      "name": "CVE-2019-19203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2023-33850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
    },
    {
      "name": "CVE-2022-48560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
    },
    {
      "name": "CVE-2017-7500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
    },
    {
      "name": "CVE-2023-42794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42794"
    },
    {
      "name": "CVE-2022-34169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
    },
    {
      "name": "CVE-2022-3094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
    },
    {
      "name": "CVE-2022-41721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41721"
    },
    {
      "name": "CVE-2022-42920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42920"
    },
    {
      "name": "CVE-2022-23437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23437"
    },
    {
      "name": "CVE-2023-42465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
    },
    {
      "name": "CVE-2023-5676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
    },
    {
      "name": "CVE-2021-33194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
    },
    {
      "name": "CVE-2024-20932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
    },
    {
      "name": "CVE-2023-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
    },
    {
      "name": "CVE-2011-4969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-4969"
    },
    {
      "name": "CVE-2024-20918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
    },
    {
      "name": "CVE-2021-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
    },
    {
      "name": "CVE-2022-46329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
    },
    {
      "name": "CVE-2023-34966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34966"
    },
    {
      "name": "CVE-2023-26604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
    },
    {
      "name": "CVE-2022-41723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
    },
    {
      "name": "CVE-2023-46589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
    },
    {
      "name": "CVE-2023-32681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
    },
    {
      "name": "CVE-2024-20945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
    },
    {
      "name": "CVE-2023-39615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
    },
    {
      "name": "CVE-2017-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
    },
    {
      "name": "CVE-2023-28486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
    },
    {
      "name": "CVE-2015-9251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
    },
    {
      "name": "CVE-2023-5388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
    },
    {
      "name": "CVE-2012-6708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-6708"
    },
    {
      "name": "CVE-2022-2127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
    },
    {
      "name": "CVE-2020-7656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
    },
    {
      "name": "CVE-2019-19012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
    },
    {
      "name": "CVE-2023-26159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2024-20952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
    },
    {
      "name": "CVE-2022-27664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
    },
    {
      "name": "CVE-2024-22234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22234"
    }
  ],
  "initial_release_date": "2024-04-12T00:00:00",
  "last_revision_date": "2024-04-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0305",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7147813 du 09 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7147813"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7148062 du 11 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7148062"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7147943 du 10 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7147943"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7147903 du 10 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7147903"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7148094 du 11 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7148094"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7148151 du 11 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7148151"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7148066 du 11 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7148066"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7148158 du 11 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7148158"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7147727 du 08 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7147727"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7148065 du 11 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7148065"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7148068 du 11 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7148068"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7147728 du 08 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7147728"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7147944 du 10 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7147944"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7147726 du 08 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7147726"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7147923 du 10 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7147923"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7147812 du 09 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7147812"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7148063 du 11 avril 2024",
      "url": "https://www.ibm.com/support/pages/node/7148063"
    }
  ]
}
  CERTFR-2024-AVI-0385
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.23 | ||
| IBM | N/A | AIX et VIOS sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions antérieures à 6.1.0.24 | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.4.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.7 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF02 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.23",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX et VIOS sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Connect:Direct Web Services versions ant\u00e9rieures \u00e0 6.1.0.24",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.4.0",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.7",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF02",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-29483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
    },
    {
      "name": "CVE-2024-20919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
    },
    {
      "name": "CVE-2023-21938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
    },
    {
      "name": "CVE-2023-1382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
    },
    {
      "name": "CVE-2023-4732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
    },
    {
      "name": "CVE-2022-48564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
    },
    {
      "name": "CVE-2023-6681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
    },
    {
      "name": "CVE-2023-3138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
    },
    {
      "name": "CVE-2023-46813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-1838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
    },
    {
      "name": "CVE-2024-27273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27273"
    },
    {
      "name": "CVE-2023-28328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
    },
    {
      "name": "CVE-2023-51043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
    },
    {
      "name": "CVE-2023-5633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2022-38457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2022-45688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
    },
    {
      "name": "CVE-2022-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
    },
    {
      "name": "CVE-2023-21939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
    },
    {
      "name": "CVE-2024-20926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
    },
    {
      "name": "CVE-2023-5178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
    },
    {
      "name": "CVE-2023-50868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
    },
    {
      "name": "CVE-2023-6536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
    },
    {
      "name": "CVE-2023-23455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
    },
    {
      "name": "CVE-2020-10001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
    },
    {
      "name": "CVE-2024-0646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
    },
    {
      "name": "CVE-2021-33503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
    },
    {
      "name": "CVE-2023-40283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
    },
    {
      "name": "CVE-2022-45884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2007-4559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
    },
    {
      "name": "CVE-2023-33951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
    },
    {
      "name": "CVE-2024-28102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
    },
    {
      "name": "CVE-2023-2163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
    },
    {
      "name": "CVE-2022-42895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
    },
    {
      "name": "CVE-2024-22361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
    },
    {
      "name": "CVE-2024-20921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
    },
    {
      "name": "CVE-2022-40133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2023-45862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
    },
    {
      "name": "CVE-2023-1989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
    },
    {
      "name": "CVE-2020-3898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-1855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
    },
    {
      "name": "CVE-2018-20060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
    },
    {
      "name": "CVE-2023-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
    },
    {
      "name": "CVE-2022-45869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
    },
    {
      "name": "CVE-2023-2513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
    },
    {
      "name": "CVE-2023-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
    },
    {
      "name": "CVE-2023-20569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
    },
    {
      "name": "CVE-2023-4206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
    },
    {
      "name": "CVE-2023-6817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
    },
    {
      "name": "CVE-2023-31084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
    },
    {
      "name": "CVE-2023-5072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
    },
    {
      "name": "CVE-2022-45919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
    },
    {
      "name": "CVE-2019-13224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
    },
    {
      "name": "CVE-2022-41858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
    },
    {
      "name": "CVE-2023-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
    },
    {
      "name": "CVE-2023-4128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
    },
    {
      "name": "CVE-2023-31436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
    },
    {
      "name": "CVE-2023-1074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
    },
    {
      "name": "CVE-2019-19204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
    },
    {
      "name": "CVE-2023-42753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
    },
    {
      "name": "CVE-2023-4921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
    },
    {
      "name": "CVE-2023-33203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
    },
    {
      "name": "CVE-2023-3812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
    },
    {
      "name": "CVE-2023-32360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2024-27269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
    },
    {
      "name": "CVE-2021-43975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
    },
    {
      "name": "CVE-2023-4207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
    },
    {
      "name": "CVE-2018-19787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
    },
    {
      "name": "CVE-2023-22067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
    },
    {
      "name": "CVE-2023-6356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
    },
    {
      "name": "CVE-2024-1488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2023-1252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
    },
    {
      "name": "CVE-2023-44794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44794"
    },
    {
      "name": "CVE-2022-3545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
    },
    {
      "name": "CVE-2023-2176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
    },
    {
      "name": "CVE-2023-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
    },
    {
      "name": "CVE-2023-1079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
    },
    {
      "name": "CVE-2022-36402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
    },
    {
      "name": "CVE-2023-33952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
    },
    {
      "name": "CVE-2023-32324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
    },
    {
      "name": "CVE-2023-36478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
    },
    {
      "name": "CVE-2014-3146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-3772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
    },
    {
      "name": "CVE-2022-4744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
    },
    {
      "name": "CVE-2023-3161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
    },
    {
      "name": "CVE-2023-35824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
    },
    {
      "name": "CVE-2023-45871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
    },
    {
      "name": "CVE-2023-1998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
    },
    {
      "name": "CVE-2023-28772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
    },
    {
      "name": "CVE-2022-40982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
    },
    {
      "name": "CVE-2019-16163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
    },
    {
      "name": "CVE-2023-1786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
    },
    {
      "name": "CVE-2023-1075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
    },
    {
      "name": "CVE-2023-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
    },
    {
      "name": "CVE-2023-38325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
    },
    {
      "name": "CVE-2023-4155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
    },
    {
      "name": "CVE-2023-4208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
    },
    {
      "name": "CVE-2023-35823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
    },
    {
      "name": "CVE-2019-9740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
    },
    {
      "name": "CVE-2023-26545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
    },
    {
      "name": "CVE-2022-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
    },
    {
      "name": "CVE-2022-45887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
    },
    {
      "name": "CVE-2023-6535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
    },
    {
      "name": "CVE-2024-26130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
    },
    {
      "name": "CVE-2023-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
    },
    {
      "name": "CVE-2019-19203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
    },
    {
      "name": "CVE-2023-1118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2023-33850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
    },
    {
      "name": "CVE-2023-2597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
    },
    {
      "name": "CVE-2022-48560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
    },
    {
      "name": "CVE-2022-3594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
    },
    {
      "name": "CVE-2023-34241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
    },
    {
      "name": "CVE-2022-38096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
    },
    {
      "name": "CVE-2023-4622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
    },
    {
      "name": "CVE-2019-8696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
    },
    {
      "name": "CVE-2020-26137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
    },
    {
      "name": "CVE-2019-11324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
    },
    {
      "name": "CVE-2023-3141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
    },
    {
      "name": "CVE-2022-28388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
    },
    {
      "name": "CVE-2023-30456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
    },
    {
      "name": "CVE-2023-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
    },
    {
      "name": "CVE-2023-5676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
    },
    {
      "name": "CVE-2023-6606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
    },
    {
      "name": "CVE-2019-11236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
    },
    {
      "name": "CVE-2023-6932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
    },
    {
      "name": "CVE-2023-0458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
    },
    {
      "name": "CVE-2023-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
    },
    {
      "name": "CVE-2023-1073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
    },
    {
      "name": "CVE-2023-3212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
    },
    {
      "name": "CVE-2021-33631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
    },
    {
      "name": "CVE-2023-50387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
    },
    {
      "name": "CVE-2024-0985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
    },
    {
      "name": "CVE-2024-20932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
    },
    {
      "name": "CVE-2022-48624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
    },
    {
      "name": "CVE-2023-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
    },
    {
      "name": "CVE-2024-20918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
    },
    {
      "name": "CVE-2023-0597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
    },
    {
      "name": "CVE-2023-6546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
    },
    {
      "name": "CVE-2023-7192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
    },
    {
      "name": "CVE-2023-4132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
    },
    {
      "name": "CVE-2024-1086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
    },
    {
      "name": "CVE-2023-1206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
    },
    {
      "name": "CVE-2024-0565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
    },
    {
      "name": "CVE-2019-8675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
    },
    {
      "name": "CVE-2023-4623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
    },
    {
      "name": "CVE-2023-51042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
    },
    {
      "name": "CVE-2023-0590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
    },
    {
      "name": "CVE-2024-20945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
    },
    {
      "name": "CVE-2023-3268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
    },
    {
      "name": "CVE-2023-21967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
    },
    {
      "name": "CVE-2023-5717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
    },
    {
      "name": "CVE-2019-19012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
    },
    {
      "name": "CVE-2020-27783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
    },
    {
      "name": "CVE-2024-20952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
    },
    {
      "name": "CVE-2021-43818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
    },
    {
      "name": "CVE-2021-43618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
    },
    {
      "name": "CVE-2023-2166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
    },
    {
      "name": "CVE-2023-1192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
    },
    {
      "name": "CVE-2023-6931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
    },
    {
      "name": "CVE-2023-6610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
    }
  ],
  "initial_release_date": "2024-05-10T00:00:00",
  "last_revision_date": "2024-05-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0385",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-05-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150297 du 06 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150297"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150684 du 09 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150684"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150803 du 09 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150803"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150277 du 05 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150277"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150196 du 03 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150196"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150798 du 09 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150798"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150804 du 09 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150804"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150799 du 09 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150799"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150276 du 05 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150276"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150802 du 09 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150802"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7150362 du 07 mai 2024",
      "url": "https://www.ibm.com/support/pages/node/7150362"
    }
  ]
}
  CERTFR-2024-AVI-1103
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 ifix 01 | ||
| IBM | QRadar SIEM | Security QRadar Log Management AQL Plugin versions antérieures à 1.1.0 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 (fixpack) GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 (fixpack) GA | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.0 ifix 01 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.11_ifix001 | 
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4",
      "product": {
        "name": "Cognos Analytics",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 ifix 01",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": " Security QRadar Log Management AQL Plugin versions ant\u00e9rieures \u00e0 1.1.0",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 (fixpack) GA",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
      "product": {
        "name": "Cognos Analytics",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 (fixpack) GA",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.0 ifix 01",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.11_ifix001",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2010-1205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
    },
    {
      "name": "CVE-2014-1544",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1544"
    },
    {
      "name": "CVE-2014-1568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
    },
    {
      "name": "CVE-2015-7182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7182"
    },
    {
      "name": "CVE-2015-7181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7181"
    },
    {
      "name": "CVE-2015-7575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7575"
    },
    {
      "name": "CVE-2016-1938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1938"
    },
    {
      "name": "CVE-2017-5461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5461"
    },
    {
      "name": "CVE-2018-12384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
    },
    {
      "name": "CVE-2019-7317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
    },
    {
      "name": "CVE-2019-11729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
    },
    {
      "name": "CVE-2019-11727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
    },
    {
      "name": "CVE-2019-11719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
    },
    {
      "name": "CVE-2018-12404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
    },
    {
      "name": "CVE-2019-11756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
    },
    {
      "name": "CVE-2019-11745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
    },
    {
      "name": "CVE-2019-8331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
    },
    {
      "name": "CVE-2019-11358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
    },
    {
      "name": "CVE-2019-17023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
    },
    {
      "name": "CVE-2020-11022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    },
    {
      "name": "CVE-2020-12400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
    },
    {
      "name": "CVE-2020-12401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
    },
    {
      "name": "CVE-2020-6829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
    },
    {
      "name": "CVE-2019-17006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
    },
    {
      "name": "CVE-2018-18508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-18508"
    },
    {
      "name": "CVE-2019-17007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17007"
    },
    {
      "name": "CVE-2018-20677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20677"
    },
    {
      "name": "CVE-2018-14040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14040"
    },
    {
      "name": "CVE-2018-14042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14042"
    },
    {
      "name": "CVE-2016-10735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
    },
    {
      "name": "CVE-2018-20676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20676"
    },
    {
      "name": "CVE-2017-12652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
    },
    {
      "name": "CVE-2020-25648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2020-12403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
    },
    {
      "name": "CVE-2021-38153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38153"
    },
    {
      "name": "CVE-2021-43138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
    },
    {
      "name": "CVE-2022-34749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
    },
    {
      "name": "CVE-2022-40897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-0767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
    },
    {
      "name": "CVE-2023-23931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2023-31130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
    },
    {
      "name": "CVE-2023-32067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
    },
    {
      "name": "CVE-2023-25194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2023-32681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
    },
    {
      "name": "CVE-2023-38325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-30774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-40217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2020-19189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2022-21699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-30086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
    },
    {
      "name": "CVE-2023-26965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
    },
    {
      "name": "CVE-2023-3316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2022-48554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
    },
    {
      "name": "CVE-2020-23064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
    },
    {
      "name": "CVE-2023-5388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
    },
    {
      "name": "CVE-2023-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2023-52426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
    },
    {
      "name": "CVE-2024-21011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
    },
    {
      "name": "CVE-2024-21094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
    },
    {
      "name": "CVE-2024-21085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
    },
    {
      "name": "CVE-2024-29133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
    },
    {
      "name": "CVE-2024-29131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
    },
    {
      "name": "CVE-2024-28849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
    },
    {
      "name": "CVE-2024-22201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2024-4367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4367"
    },
    {
      "name": "CVE-2024-27983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
    },
    {
      "name": "CVE-2023-51074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
    },
    {
      "name": "CVE-2024-23944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
    },
    {
      "name": "CVE-2023-38264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
    },
    {
      "name": "CVE-2024-29025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
    },
    {
      "name": "CVE-2024-34102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34102"
    },
    {
      "name": "CVE-2024-28757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
    },
    {
      "name": "CVE-2024-29041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2021-36770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-28176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
    },
    {
      "name": "CVE-2024-28863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2024-4068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
    },
    {
      "name": "CVE-2023-50495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
    },
    {
      "name": "CVE-2024-27982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
    },
    {
      "name": "CVE-2023-52356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
    },
    {
      "name": "CVE-2023-6228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
    },
    {
      "name": "CVE-2023-6277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2024-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
    },
    {
      "name": "CVE-2024-39008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
    },
    {
      "name": "CVE-2023-3164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
    },
    {
      "name": "CVE-2024-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
    },
    {
      "name": "CVE-2024-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
    },
    {
      "name": "CVE-2024-27980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
    },
    {
      "name": "CVE-2024-36137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
    },
    {
      "name": "CVE-2024-36138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
    },
    {
      "name": "CVE-2024-37372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2024-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22871"
    },
    {
      "name": "CVE-2018-15209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
    },
    {
      "name": "CVE-2023-37536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-43796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
    },
    {
      "name": "CVE-2024-45590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
    },
    {
      "name": "CVE-2018-14041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14041"
    },
    {
      "name": "CVE-2024-36114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
    },
    {
      "name": "CVE-2024-25638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
    },
    {
      "name": "CVE-2024-51504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
    },
    {
      "name": "CVE-2024-7006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
    },
    {
      "name": "CVE-2013-2099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-2099"
    },
    {
      "name": "CVE-2014-1569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1569"
    },
    {
      "name": "CVE-2017-11613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11613"
    },
    {
      "name": "CVE-2017-11695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11695"
    },
    {
      "name": "CVE-2017-11696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11696"
    },
    {
      "name": "CVE-2017-11697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11697"
    },
    {
      "name": "CVE-2017-11698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11698"
    },
    {
      "name": "CVE-2017-12627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12627"
    },
    {
      "name": "CVE-2017-18013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18013"
    },
    {
      "name": "CVE-2017-18869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18869"
    },
    {
      "name": "CVE-2017-9937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
    },
    {
      "name": "CVE-2018-16335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-16335"
    },
    {
      "name": "CVE-2018-17000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17000"
    },
    {
      "name": "CVE-2018-17100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17100"
    },
    {
      "name": "CVE-2018-17101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17101"
    },
    {
      "name": "CVE-2018-19210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-19210"
    },
    {
      "name": "CVE-2018-5784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5784"
    },
    {
      "name": "CVE-2018-7456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7456"
    },
    {
      "name": "CVE-2019-10255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10255"
    },
    {
      "name": "CVE-2019-14973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14973"
    },
    {
      "name": "CVE-2019-17546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17546"
    },
    {
      "name": "CVE-2019-6128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-6128"
    },
    {
      "name": "CVE-2020-15110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15110"
    },
    {
      "name": "CVE-2020-18768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-18768"
    },
    {
      "name": "CVE-2020-19131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19131"
    },
    {
      "name": "CVE-2020-19144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19144"
    },
    {
      "name": "CVE-2020-26261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26261"
    },
    {
      "name": "CVE-2020-35521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35521"
    },
    {
      "name": "CVE-2020-35522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35522"
    },
    {
      "name": "CVE-2020-35523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35523"
    },
    {
      "name": "CVE-2020-35524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35524"
    },
    {
      "name": "CVE-2020-36191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36191"
    },
    {
      "name": "CVE-2021-32862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32862"
    },
    {
      "name": "CVE-2022-0561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
    },
    {
      "name": "CVE-2022-0562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
    },
    {
      "name": "CVE-2022-0891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
    },
    {
      "name": "CVE-2022-0908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
    },
    {
      "name": "CVE-2022-2056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
    },
    {
      "name": "CVE-2022-2057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
    },
    {
      "name": "CVE-2022-2058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
    },
    {
      "name": "CVE-2022-22844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
    },
    {
      "name": "CVE-2022-2867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
    },
    {
      "name": "CVE-2022-2868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
    },
    {
      "name": "CVE-2022-2869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
    },
    {
      "name": "CVE-2022-34266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34266"
    },
    {
      "name": "CVE-2022-34526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
    },
    {
      "name": "CVE-2022-3479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
    },
    {
      "name": "CVE-2022-3570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
    },
    {
      "name": "CVE-2022-3597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
    },
    {
      "name": "CVE-2022-3598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
    },
    {
      "name": "CVE-2022-3599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
    },
    {
      "name": "CVE-2022-3626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
    },
    {
      "name": "CVE-2022-3627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
    },
    {
      "name": "CVE-2022-40090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
    },
    {
      "name": "CVE-2022-4645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
    },
    {
      "name": "CVE-2023-0795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
    },
    {
      "name": "CVE-2023-0796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
    },
    {
      "name": "CVE-2023-0797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
    },
    {
      "name": "CVE-2023-0798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
    },
    {
      "name": "CVE-2023-0799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
    },
    {
      "name": "CVE-2023-0800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
    },
    {
      "name": "CVE-2023-0801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
    },
    {
      "name": "CVE-2023-0802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
    },
    {
      "name": "CVE-2023-0803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
    },
    {
      "name": "CVE-2023-0804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
    },
    {
      "name": "CVE-2023-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
    },
    {
      "name": "CVE-2023-24816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24816"
    },
    {
      "name": "CVE-2023-25434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
    },
    {
      "name": "CVE-2023-25435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
    },
    {
      "name": "CVE-2023-2731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
    },
    {
      "name": "CVE-2023-2908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
    },
    {
      "name": "CVE-2023-30775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
    },
    {
      "name": "CVE-2023-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
    },
    {
      "name": "CVE-2023-38288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38288"
    },
    {
      "name": "CVE-2023-38289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38289"
    },
    {
      "name": "CVE-2023-40745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
    },
    {
      "name": "CVE-2023-41175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
    },
    {
      "name": "CVE-2023-41334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41334"
    },
    {
      "name": "CVE-2023-4421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4421"
    },
    {
      "name": "CVE-2023-4759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4759"
    },
    {
      "name": "CVE-2023-50291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
    },
    {
      "name": "CVE-2023-50292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50292"
    },
    {
      "name": "CVE-2023-50298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
    },
    {
      "name": "CVE-2023-50386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
    },
    {
      "name": "CVE-2023-50447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50447"
    },
    {
      "name": "CVE-2024-25016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25016"
    },
    {
      "name": "CVE-2024-29896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29896"
    },
    {
      "name": "CVE-2024-33883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
    },
    {
      "name": "CVE-2024-38337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38337"
    },
    {
      "name": "CVE-2024-41752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41752"
    },
    {
      "name": "CVE-2024-45082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45082"
    }
  ],
  "initial_release_date": "2024-12-20T00:00:00",
  "last_revision_date": "2024-12-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1103",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7177142",
      "url": "https://www.ibm.com/support/pages/node/7177142"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7177223",
      "url": "https://www.ibm.com/support/pages/node/7177223"
    },
    {
      "published_at": "2024-12-16",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7179044",
      "url": "https://www.ibm.com/support/pages/node/7179044"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7179156",
      "url": "https://www.ibm.com/support/pages/node/7179156"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7179166",
      "url": "https://www.ibm.com/support/pages/node/7179166"
    },
    {
      "published_at": "2024-12-13",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7178835",
      "url": "https://www.ibm.com/support/pages/node/7178835"
    }
  ]
}
  CERTFR-2025-AVI-0422
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans IBM QRadar SIEM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QRadar Incident Forensics versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP12",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP12",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
    },
    {
      "name": "CVE-2023-50386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
    },
    {
      "name": "CVE-2024-56326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
    },
    {
      "name": "CVE-2024-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2020-13955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13955"
    },
    {
      "name": "CVE-2022-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
    },
    {
      "name": "CVE-2022-39135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39135"
    },
    {
      "name": "CVE-2022-41678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41678"
    },
    {
      "name": "CVE-2023-50298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
    },
    {
      "name": "CVE-2023-50292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50292"
    },
    {
      "name": "CVE-2023-35116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
    },
    {
      "name": "CVE-2024-29131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
    },
    {
      "name": "CVE-2023-50291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
    },
    {
      "name": "CVE-2019-12900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
    },
    {
      "name": "CVE-2024-29133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
    },
    {
      "name": "CVE-2024-56201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
    },
    {
      "name": "CVE-2022-42004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2024-10041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
    },
    {
      "name": "CVE-2022-34169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
    },
    {
      "name": "CVE-2024-10963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
    },
    {
      "name": "CVE-2024-55549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
    },
    {
      "name": "CVE-2024-50602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
    },
    {
      "name": "CVE-2025-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
    },
    {
      "name": "CVE-2024-47072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47072"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2022-42003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
    },
    {
      "name": "CVE-2023-5752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    }
  ],
  "initial_release_date": "2025-05-16T00:00:00",
  "last_revision_date": "2025-05-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0422",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar SIEM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar SIEM",
  "vendor_advisories": [
    {
      "published_at": "2025-05-14",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7233394",
      "url": "https://www.ibm.com/support/pages/node/7233394"
    }
  ]
}
  CERTFR-2024-AVI-0459
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions postérieures à 3.5 et antérieures à 4.8.5 | ||
| IBM | N/A | DevOps Code ClearCase versions 11.0.x sans le dernier correctif de sécurité | ||
| IBM | N/A | Rational ClearCase versions 9.1.x et 10.0.0.x sans le dernier correctif de sécurité | 
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions post\u00e9rieures \u00e0 3.5 et ant\u00e9rieures \u00e0 4.8.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "DevOps Code ClearCase versions 11.0.x sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Rational ClearCase versions 9.1.x et 10.0.0.x sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-1597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
    },
    {
      "name": "CVE-2023-49568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49568"
    },
    {
      "name": "CVE-2024-25030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25030"
    },
    {
      "name": "CVE-2023-45857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
    },
    {
      "name": "CVE-2024-23944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
    },
    {
      "name": "CVE-2020-9546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
    },
    {
      "name": "CVE-2020-13956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
    },
    {
      "name": "CVE-2020-10673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
    },
    {
      "name": "CVE-2020-35728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
    },
    {
      "name": "CVE-2020-36181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
    },
    {
      "name": "CVE-2020-9548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
    },
    {
      "name": "CVE-2020-36182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
    },
    {
      "name": "CVE-2020-24616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
    },
    {
      "name": "CVE-2023-52296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52296"
    },
    {
      "name": "CVE-2020-36185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
    },
    {
      "name": "CVE-2024-25046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25046"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2022-36364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
    },
    {
      "name": "CVE-2022-1996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1996"
    },
    {
      "name": "CVE-2019-16942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
    },
    {
      "name": "CVE-2019-11358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
    },
    {
      "name": "CVE-2020-9547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
    },
    {
      "name": "CVE-2020-36179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
    },
    {
      "name": "CVE-2020-10650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10650"
    },
    {
      "name": "CVE-2023-44270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
    },
    {
      "name": "CVE-2020-36186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
    },
    {
      "name": "CVE-2020-36189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
    },
    {
      "name": "CVE-2020-35490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
    },
    {
      "name": "CVE-2023-34462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
    },
    {
      "name": "CVE-2018-1313",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1313"
    },
    {
      "name": "CVE-2022-46337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46337"
    },
    {
      "name": "CVE-2021-20190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
    },
    {
      "name": "CVE-2019-13224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
    },
    {
      "name": "CVE-2019-19204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
    },
    {
      "name": "CVE-2020-11113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
    },
    {
      "name": "CVE-2024-27254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27254"
    },
    {
      "name": "CVE-2020-10672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
    },
    {
      "name": "CVE-2023-51074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
    },
    {
      "name": "CVE-2020-10969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
    },
    {
      "name": "CVE-2020-23064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2020-36187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
    },
    {
      "name": "CVE-2020-11620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
    },
    {
      "name": "CVE-2023-36478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
    },
    {
      "name": "CVE-2015-1832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-1832"
    },
    {
      "name": "CVE-2021-21295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
    },
    {
      "name": "CVE-2020-24750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
    },
    {
      "name": "CVE-2024-22190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
    },
    {
      "name": "CVE-2019-16163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
    },
    {
      "name": "CVE-2019-16943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
    },
    {
      "name": "CVE-2023-51775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
    },
    {
      "name": "CVE-2024-22360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22360"
    },
    {
      "name": "CVE-2024-26130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
    },
    {
      "name": "CVE-2019-20330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
    },
    {
      "name": "CVE-2020-14195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
    },
    {
      "name": "CVE-2023-44981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
    },
    {
      "name": "CVE-2018-10237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
    },
    {
      "name": "CVE-2020-35491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
    },
    {
      "name": "CVE-2019-17531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
    },
    {
      "name": "CVE-2023-38729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38729"
    },
    {
      "name": "CVE-2024-21626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21626"
    },
    {
      "name": "CVE-2019-19203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
    },
    {
      "name": "CVE-2020-14061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
    },
    {
      "name": "CVE-2023-40167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
    },
    {
      "name": "CVE-2023-41900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
    },
    {
      "name": "CVE-2022-42004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
    },
    {
      "name": "CVE-2020-11619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
    },
    {
      "name": "CVE-2020-36183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
    },
    {
      "name": "CVE-2020-8840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
    },
    {
      "name": "CVE-2023-36479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
    },
    {
      "name": "CVE-2024-24549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
    },
    {
      "name": "CVE-2020-36184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
    },
    {
      "name": "CVE-2020-36180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
    },
    {
      "name": "CVE-2020-11022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
    },
    {
      "name": "CVE-2021-31684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
    },
    {
      "name": "CVE-2020-36518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
    },
    {
      "name": "CVE-2023-261257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-261257"
    },
    {
      "name": "CVE-2023-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
    },
    {
      "name": "CVE-2023-49569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49569"
    },
    {
      "name": "CVE-2020-10968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
    },
    {
      "name": "CVE-2022-42003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
    },
    {
      "name": "CVE-2020-25649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
    },
    {
      "name": "CVE-2024-0690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0690"
    },
    {
      "name": "CVE-2024-22354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
    },
    {
      "name": "CVE-2020-11112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
    },
    {
      "name": "CVE-2019-19012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
    },
    {
      "name": "CVE-2020-11111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
    },
    {
      "name": "CVE-2012-2677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2677"
    },
    {
      "name": "CVE-2020-14060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
    },
    {
      "name": "CVE-2020-36188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    },
    {
      "name": "CVE-2020-14062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
    }
  ],
  "initial_release_date": "2024-05-31T00:00:00",
  "last_revision_date": "2024-05-31T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0459",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-05-31T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-05-29",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7155114",
      "url": "https://www.ibm.com/support/pages/node/7155114"
    },
    {
      "published_at": "2024-05-28",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7155078",
      "url": "https://www.ibm.com/support/pages/node/7155078"
    }
  ]
}
  suse-su-2024:3757-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openssl-1_1",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openssl-1_1 fixes the following issues:\n\n- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3757,SUSE-SLE-SERVER-12-SP5-LTSS-2024-3757,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-3757",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3757-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3757-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243757-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3757-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019679.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220262",
        "url": "https://bugzilla.suse.com/1220262"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-50782 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-50782/"
      }
    ],
    "title": "Security update for openssl-1_1",
    "tracking": {
      "current_release_date": "2024-10-25T10:30:29Z",
      "generator": {
        "date": "2024-10-25T10:30:29Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3757-1",
      "initial_release_date": "2024-10-25T10:30:29Z",
      "revision_history": [
        {
          "date": "2024-10-25T10:30:29Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.aarch64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.aarch64",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-2.113.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-2.113.1.aarch64",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-2.113.1.aarch64",
                  "product_id": "libopenssl1_1-1.1.1d-2.113.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.aarch64",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.aarch64",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-2.113.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-2.113.1.aarch64",
                "product": {
                  "name": "openssl-1_1-1.1.1d-2.113.1.aarch64",
                  "product_id": "openssl-1_1-1.1.1d-2.113.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-64bit-1.1.1d-2.113.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl-1_1-devel-64bit-1.1.1d-2.113.1.aarch64_ilp32",
                  "product_id": "libopenssl-1_1-devel-64bit-1.1.1d-2.113.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-64bit-1.1.1d-2.113.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl1_1-64bit-1.1.1d-2.113.1.aarch64_ilp32",
                  "product_id": "libopenssl1_1-64bit-1.1.1d-2.113.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-64bit-1.1.1d-2.113.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl1_1-hmac-64bit-1.1.1d-2.113.1.aarch64_ilp32",
                  "product_id": "libopenssl1_1-hmac-64bit-1.1.1d-2.113.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.i586",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.i586",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-2.113.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-2.113.1.i586",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-2.113.1.i586",
                  "product_id": "libopenssl1_1-1.1.1d-2.113.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.i586",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.i586",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-2.113.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-2.113.1.i586",
                "product": {
                  "name": "openssl-1_1-1.1.1d-2.113.1.i586",
                  "product_id": "openssl-1_1-1.1.1d-2.113.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-1_1-doc-1.1.1d-2.113.1.noarch",
                "product": {
                  "name": "openssl-1_1-doc-1.1.1d-2.113.1.noarch",
                  "product_id": "openssl-1_1-doc-1.1.1d-2.113.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.ppc64le",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.ppc64le",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-2.113.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-2.113.1.ppc64le",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-2.113.1.ppc64le",
                  "product_id": "libopenssl1_1-1.1.1d-2.113.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.ppc64le",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.ppc64le",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-2.113.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-2.113.1.ppc64le",
                "product": {
                  "name": "openssl-1_1-1.1.1d-2.113.1.ppc64le",
                  "product_id": "openssl-1_1-1.1.1d-2.113.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.s390",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.s390",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-2.113.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-2.113.1.s390",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-2.113.1.s390",
                  "product_id": "libopenssl1_1-1.1.1d-2.113.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.s390",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.s390",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-2.113.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-2.113.1.s390",
                "product": {
                  "name": "openssl-1_1-1.1.1d-2.113.1.s390",
                  "product_id": "openssl-1_1-1.1.1d-2.113.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.s390x",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.s390x",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-2.113.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.113.1.s390x",
                "product": {
                  "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.113.1.s390x",
                  "product_id": "libopenssl-1_1-devel-32bit-1.1.1d-2.113.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-2.113.1.s390x",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-2.113.1.s390x",
                  "product_id": "libopenssl1_1-1.1.1d-2.113.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-32bit-1.1.1d-2.113.1.s390x",
                "product": {
                  "name": "libopenssl1_1-32bit-1.1.1d-2.113.1.s390x",
                  "product_id": "libopenssl1_1-32bit-1.1.1d-2.113.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.s390x",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.s390x",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-2.113.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.s390x",
                "product": {
                  "name": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.s390x",
                  "product_id": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-2.113.1.s390x",
                "product": {
                  "name": "openssl-1_1-1.1.1d-2.113.1.s390x",
                  "product_id": "openssl-1_1-1.1.1d-2.113.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-2.113.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-2.113.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.113.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.113.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-32bit-1.1.1d-2.113.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-2.113.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-2.113.1.x86_64",
                  "product_id": "libopenssl1_1-1.1.1d-2.113.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
                  "product_id": "libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
                  "product_id": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-2.113.1.x86_64",
                "product": {
                  "name": "openssl-1_1-1.1.1d-2.113.1.x86_64",
                  "product_id": "openssl-1_1-1.1.1d-2.113.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-2.113.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-2.113.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-2.113.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1d-2.113.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-2.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1d-2.113.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-2.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-32bit-1.1.1d-2.113.1.s390x"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-2.113.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-2.113.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-2.113.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-2.113.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-2.113.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1d-2.113.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-2.113.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1d-2.113.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-2.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1d-2.113.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-2.113.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssl-1_1-1.1.1d-2.113.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-2.113.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-50782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-32bit-1.1.1d-2.113.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-1.1.1d-2.113.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssl-1_1-1.1.1d-2.113.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-50782",
          "url": "https://www.suse.com/security/cve/CVE-2023-50782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218043 for CVE-2023-50782",
          "url": "https://bugzilla.suse.com/1218043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-32bit-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssl-1_1-1.1.1d-2.113.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-32bit-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:openssl-1_1-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-32bit-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-hmac-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.113.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssl-1_1-1.1.1d-2.113.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-10-25T10:30:29Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-50782"
    }
  ]
}
  suse-su-2024:3765-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openssl-1_1",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openssl-1_1 fixes the following issues:\n\n- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3765,SUSE-SLE-Micro-5.5-2024-3765,SUSE-SLE-Module-Basesystem-15-SP5-2024-3765,openSUSE-Leap-Micro-5.5-2024-3765,openSUSE-SLE-15.5-2024-3765",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3765-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3765-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243765-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3765-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019685.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220262",
        "url": "https://bugzilla.suse.com/1220262"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-50782 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-50782/"
      }
    ],
    "title": "Security update for openssl-1_1",
    "tracking": {
      "current_release_date": "2024-10-29T01:34:06Z",
      "generator": {
        "date": "2024-10-29T01:34:06Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3765-1",
      "initial_release_date": "2024-10-29T01:34:06Z",
      "revision_history": [
        {
          "date": "2024-10-29T01:34:06Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
                  "product_id": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
                  "product_id": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-64bit-1.1.1l-150500.17.37.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl-1_1-devel-64bit-1.1.1l-150500.17.37.1.aarch64_ilp32",
                  "product_id": "libopenssl-1_1-devel-64bit-1.1.1l-150500.17.37.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-64bit-1.1.1l-150500.17.37.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl1_1-64bit-1.1.1l-150500.17.37.1.aarch64_ilp32",
                  "product_id": "libopenssl1_1-64bit-1.1.1l-150500.17.37.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-64bit-1.1.1l-150500.17.37.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl1_1-hmac-64bit-1.1.1l-150500.17.37.1.aarch64_ilp32",
                  "product_id": "libopenssl1_1-hmac-64bit-1.1.1l-150500.17.37.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.i586",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.i586",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150500.17.37.1.i586",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150500.17.37.1.i586",
                  "product_id": "libopenssl1_1-1.1.1l-150500.17.37.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.i586",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.i586",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150500.17.37.1.i586",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150500.17.37.1.i586",
                  "product_id": "openssl-1_1-1.1.1l-150500.17.37.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-1_1-doc-1.1.1l-150500.17.37.1.noarch",
                "product": {
                  "name": "openssl-1_1-doc-1.1.1l-150500.17.37.1.noarch",
                  "product_id": "openssl-1_1-doc-1.1.1l-150500.17.37.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
                  "product_id": "libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
                  "product_id": "openssl-1_1-1.1.1l-150500.17.37.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
                  "product_id": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150500.17.37.1.s390x",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150500.17.37.1.s390x",
                  "product_id": "openssl-1_1-1.1.1l-150500.17.37.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
                  "product_id": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
                  "product_id": "libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
                  "product_id": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
                  "product_id": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.5",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.5",
                  "product_id": "SUSE Linux Enterprise Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap Micro 5.5",
                "product": {
                  "name": "openSUSE Leap Micro 5.5",
                  "product_id": "openSUSE Leap Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap-micro:5.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.s390x as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-doc-1.1.1l-150500.17.37.1.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-1_1-doc-1.1.1l-150500.17.37.1.noarch"
        },
        "product_reference": "openssl-1_1-doc-1.1.1l-150500.17.37.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-50782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
          "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
          "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
          "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
          "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
          "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
          "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
          "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap 15.5:libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
          "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
          "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
          "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap 15.5:libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
          "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
          "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
          "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap 15.5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
          "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
          "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
          "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap 15.5:openssl-1_1-doc-1.1.1l-150500.17.37.1.noarch",
          "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
          "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
          "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
          "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
          "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
          "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
          "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
          "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
          "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
          "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-50782",
          "url": "https://www.suse.com/security/cve/CVE-2023-50782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218043 for CVE-2023-50782",
          "url": "https://bugzilla.suse.com/1218043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
            "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:openssl-1_1-doc-1.1.1l-150500.17.37.1.noarch",
            "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl1_1-32bit-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.ppc64le",
            "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap 15.5:openssl-1_1-doc-1.1.1l-150500.17.37.1.noarch",
            "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.37.1.x86_64",
            "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.aarch64",
            "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.s390x",
            "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-10-29T01:34:06Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-50782"
    }
  ]
}
  suse-su-2024:3871-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openssl-3",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openssl-3 fixes the following issues:\n\n- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)\n- CVE-2024-41996: Avoid expensive public key validation for known safe-prime groups (DHEATATTACK) (bsc#1230698)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3871,SUSE-SLE-Micro-5.3-2024-3871,SUSE-SLE-Micro-5.4-2024-3871,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3871,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3871,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3871",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3871-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3871-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243871-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3871-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019759.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220262",
        "url": "https://bugzilla.suse.com/1220262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1230698",
        "url": "https://bugzilla.suse.com/1230698"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-50782 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-50782/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-41996 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-41996/"
      }
    ],
    "title": "Security update for openssl-3",
    "tracking": {
      "current_release_date": "2024-11-01T15:20:04Z",
      "generator": {
        "date": "2024-11-01T15:20:04Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3871-1",
      "initial_release_date": "2024-11-01T15:20:04Z",
      "revision_history": [
        {
          "date": "2024-11-01T15:20:04Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64",
                  "product_id": "libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150400.4.69.1.aarch64",
                "product": {
                  "name": "libopenssl3-3.0.8-150400.4.69.1.aarch64",
                  "product_id": "libopenssl3-3.0.8-150400.4.69.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150400.4.69.1.aarch64",
                "product": {
                  "name": "openssl-3-3.0.8-150400.4.69.1.aarch64",
                  "product_id": "openssl-3-3.0.8-150400.4.69.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-64bit-3.0.8-150400.4.69.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl-3-devel-64bit-3.0.8-150400.4.69.1.aarch64_ilp32",
                  "product_id": "libopenssl-3-devel-64bit-3.0.8-150400.4.69.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-64bit-3.0.8-150400.4.69.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl3-64bit-3.0.8-150400.4.69.1.aarch64_ilp32",
                  "product_id": "libopenssl3-64bit-3.0.8-150400.4.69.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.i586",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.i586",
                  "product_id": "libopenssl-3-devel-3.0.8-150400.4.69.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150400.4.69.1.i586",
                "product": {
                  "name": "libopenssl3-3.0.8-150400.4.69.1.i586",
                  "product_id": "libopenssl3-3.0.8-150400.4.69.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150400.4.69.1.i586",
                "product": {
                  "name": "openssl-3-3.0.8-150400.4.69.1.i586",
                  "product_id": "openssl-3-3.0.8-150400.4.69.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-3-doc-3.0.8-150400.4.69.1.noarch",
                "product": {
                  "name": "openssl-3-doc-3.0.8-150400.4.69.1.noarch",
                  "product_id": "openssl-3-doc-3.0.8-150400.4.69.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
                  "product_id": "libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150400.4.69.1.ppc64le",
                "product": {
                  "name": "libopenssl3-3.0.8-150400.4.69.1.ppc64le",
                  "product_id": "libopenssl3-3.0.8-150400.4.69.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150400.4.69.1.ppc64le",
                "product": {
                  "name": "openssl-3-3.0.8-150400.4.69.1.ppc64le",
                  "product_id": "openssl-3-3.0.8-150400.4.69.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
                  "product_id": "libopenssl-3-devel-3.0.8-150400.4.69.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150400.4.69.1.s390x",
                "product": {
                  "name": "libopenssl3-3.0.8-150400.4.69.1.s390x",
                  "product_id": "libopenssl3-3.0.8-150400.4.69.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150400.4.69.1.s390x",
                "product": {
                  "name": "openssl-3-3.0.8-150400.4.69.1.s390x",
                  "product_id": "openssl-3-3.0.8-150400.4.69.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
                  "product_id": "libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-32bit-3.0.8-150400.4.69.1.x86_64",
                "product": {
                  "name": "libopenssl-3-devel-32bit-3.0.8-150400.4.69.1.x86_64",
                  "product_id": "libopenssl-3-devel-32bit-3.0.8-150400.4.69.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150400.4.69.1.x86_64",
                "product": {
                  "name": "libopenssl3-3.0.8-150400.4.69.1.x86_64",
                  "product_id": "libopenssl3-3.0.8-150400.4.69.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-32bit-3.0.8-150400.4.69.1.x86_64",
                "product": {
                  "name": "libopenssl3-32bit-3.0.8-150400.4.69.1.x86_64",
                  "product_id": "libopenssl3-32bit-3.0.8-150400.4.69.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150400.4.69.1.x86_64",
                "product": {
                  "name": "openssl-3-3.0.8-150400.4.69.1.x86_64",
                  "product_id": "openssl-3-3.0.8-150400.4.69.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.3",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.3",
                  "product_id": "SUSE Linux Enterprise Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.4",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.4",
                  "product_id": "SUSE Linux Enterprise Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.3",
                "product": {
                  "name": "SUSE Manager Server 4.3",
                  "product_id": "SUSE Manager Server 4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-server:4.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.aarch64"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.s390x"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.x86_64"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.aarch64"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.s390x"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.x86_64"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.aarch64"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.ppc64le"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.s390x"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.x86_64"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150400.4.69.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.aarch64"
        },
        "product_reference": "openssl-3-3.0.8-150400.4.69.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150400.4.69.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.ppc64le"
        },
        "product_reference": "openssl-3-3.0.8-150400.4.69.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150400.4.69.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.s390x"
        },
        "product_reference": "openssl-3-3.0.8-150400.4.69.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150400.4.69.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.x86_64"
        },
        "product_reference": "openssl-3-3.0.8-150400.4.69.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.ppc64le"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.s390x"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150400.4.69.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.x86_64"
        },
        "product_reference": "libopenssl3-3.0.8-150400.4.69.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150400.4.69.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.ppc64le"
        },
        "product_reference": "openssl-3-3.0.8-150400.4.69.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150400.4.69.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.s390x"
        },
        "product_reference": "openssl-3-3.0.8-150400.4.69.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150400.4.69.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.x86_64"
        },
        "product_reference": "openssl-3-3.0.8-150400.4.69.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-50782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
          "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
          "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.s390x",
          "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-50782",
          "url": "https://www.suse.com/security/cve/CVE-2023-50782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218043 for CVE-2023-50782",
          "url": "https://bugzilla.suse.com/1218043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-11-01T15:20:04Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2024-41996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-41996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
          "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
          "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
          "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.ppc64le",
          "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.s390x",
          "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-41996",
          "url": "https://www.suse.com/security/cve/CVE-2024-41996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1229742 for CVE-2024-41996",
          "url": "https://bugzilla.suse.com/1229742"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.69.1.x86_64",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.ppc64le",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.s390x",
            "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.69.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-11-01T15:20:04Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-41996"
    }
  ]
}
  suse-su-2024:3943-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openssl-3",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openssl-3 fixes the following issues:\n\n- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3943,SUSE-SLE-Module-Basesystem-15-SP6-2024-3943,openSUSE-SLE-15.6-2024-3943",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3943-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3943-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243943-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3943-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019786.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220262",
        "url": "https://bugzilla.suse.com/1220262"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-50782 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-50782/"
      }
    ],
    "title": "Security update for openssl-3",
    "tracking": {
      "current_release_date": "2024-11-07T10:12:01Z",
      "generator": {
        "date": "2024-11-07T10:12:01Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3943-1",
      "initial_release_date": "2024-11-07T10:12:01Z",
      "revision_history": [
        {
          "date": "2024-11-07T10:12:01Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
                "product": {
                  "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
                  "product_id": "libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
                "product": {
                  "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
                  "product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.1.4-150600.5.21.1.aarch64",
                "product": {
                  "name": "libopenssl3-3.1.4-150600.5.21.1.aarch64",
                  "product_id": "libopenssl3-3.1.4-150600.5.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.1.4-150600.5.21.1.aarch64",
                "product": {
                  "name": "openssl-3-3.1.4-150600.5.21.1.aarch64",
                  "product_id": "openssl-3-3.1.4-150600.5.21.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-64bit-3.1.4-150600.5.21.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl-3-devel-64bit-3.1.4-150600.5.21.1.aarch64_ilp32",
                  "product_id": "libopenssl-3-devel-64bit-3.1.4-150600.5.21.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-64bit-3.1.4-150600.5.21.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl-3-fips-provider-64bit-3.1.4-150600.5.21.1.aarch64_ilp32",
                  "product_id": "libopenssl-3-fips-provider-64bit-3.1.4-150600.5.21.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-64bit-3.1.4-150600.5.21.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl3-64bit-3.1.4-150600.5.21.1.aarch64_ilp32",
                  "product_id": "libopenssl3-64bit-3.1.4-150600.5.21.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.i586",
                "product": {
                  "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.i586",
                  "product_id": "libopenssl-3-devel-3.1.4-150600.5.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.i586",
                "product": {
                  "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.i586",
                  "product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.1.4-150600.5.21.1.i586",
                "product": {
                  "name": "libopenssl3-3.1.4-150600.5.21.1.i586",
                  "product_id": "libopenssl3-3.1.4-150600.5.21.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.1.4-150600.5.21.1.i586",
                "product": {
                  "name": "openssl-3-3.1.4-150600.5.21.1.i586",
                  "product_id": "openssl-3-3.1.4-150600.5.21.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-3-doc-3.1.4-150600.5.21.1.noarch",
                "product": {
                  "name": "openssl-3-doc-3.1.4-150600.5.21.1.noarch",
                  "product_id": "openssl-3-doc-3.1.4-150600.5.21.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
                "product": {
                  "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
                  "product_id": "libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
                "product": {
                  "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
                  "product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.1.4-150600.5.21.1.ppc64le",
                "product": {
                  "name": "libopenssl3-3.1.4-150600.5.21.1.ppc64le",
                  "product_id": "libopenssl3-3.1.4-150600.5.21.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.1.4-150600.5.21.1.ppc64le",
                "product": {
                  "name": "openssl-3-3.1.4-150600.5.21.1.ppc64le",
                  "product_id": "openssl-3-3.1.4-150600.5.21.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
                "product": {
                  "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
                  "product_id": "libopenssl-3-devel-3.1.4-150600.5.21.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
                "product": {
                  "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
                  "product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.1.4-150600.5.21.1.s390x",
                "product": {
                  "name": "libopenssl3-3.1.4-150600.5.21.1.s390x",
                  "product_id": "libopenssl3-3.1.4-150600.5.21.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.1.4-150600.5.21.1.s390x",
                "product": {
                  "name": "openssl-3-3.1.4-150600.5.21.1.s390x",
                  "product_id": "openssl-3-3.1.4-150600.5.21.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
                "product": {
                  "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
                  "product_id": "libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-32bit-3.1.4-150600.5.21.1.x86_64",
                "product": {
                  "name": "libopenssl-3-devel-32bit-3.1.4-150600.5.21.1.x86_64",
                  "product_id": "libopenssl-3-devel-32bit-3.1.4-150600.5.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
                "product": {
                  "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
                  "product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
                "product": {
                  "name": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
                  "product_id": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.1.4-150600.5.21.1.x86_64",
                "product": {
                  "name": "libopenssl3-3.1.4-150600.5.21.1.x86_64",
                  "product_id": "libopenssl3-3.1.4-150600.5.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
                "product": {
                  "name": "libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
                  "product_id": "libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.1.4-150600.5.21.1.x86_64",
                "product": {
                  "name": "openssl-3-3.1.4-150600.5.21.1.x86_64",
                  "product_id": "openssl-3-3.1.4-150600.5.21.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.6",
                "product": {
                  "name": "openSUSE Leap 15.6",
                  "product_id": "openSUSE Leap 15.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.s390x"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-150600.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.aarch64"
        },
        "product_reference": "libopenssl3-3.1.4-150600.5.21.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-150600.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.ppc64le"
        },
        "product_reference": "libopenssl3-3.1.4-150600.5.21.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-150600.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.s390x"
        },
        "product_reference": "libopenssl3-3.1.4-150600.5.21.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-150600.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl3-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-150600.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.aarch64"
        },
        "product_reference": "openssl-3-3.1.4-150600.5.21.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-150600.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.ppc64le"
        },
        "product_reference": "openssl-3-3.1.4-150600.5.21.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-150600.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.s390x"
        },
        "product_reference": "openssl-3-3.1.4-150600.5.21.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-150600.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "openssl-3-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.s390x"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-32bit-3.1.4-150600.5.21.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-devel-32bit-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-32bit-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-150600.5.21.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.aarch64"
        },
        "product_reference": "libopenssl3-3.1.4-150600.5.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-150600.5.21.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.ppc64le"
        },
        "product_reference": "libopenssl3-3.1.4-150600.5.21.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-150600.5.21.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.s390x"
        },
        "product_reference": "libopenssl3-3.1.4-150600.5.21.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-150600.5.21.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl3-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-150600.5.21.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.aarch64"
        },
        "product_reference": "openssl-3-3.1.4-150600.5.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-150600.5.21.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.ppc64le"
        },
        "product_reference": "openssl-3-3.1.4-150600.5.21.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-150600.5.21.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.s390x"
        },
        "product_reference": "openssl-3-3.1.4-150600.5.21.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-150600.5.21.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.x86_64"
        },
        "product_reference": "openssl-3-3.1.4-150600.5.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-doc-3.1.4-150600.5.21.1.noarch as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-3-doc-3.1.4-150600.5.21.1.noarch"
        },
        "product_reference": "openssl-3-doc-3.1.4-150600.5.21.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-50782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.x86_64",
          "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
          "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
          "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
          "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
          "openSUSE Leap 15.6:libopenssl-3-devel-32bit-3.1.4-150600.5.21.1.x86_64",
          "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
          "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
          "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
          "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
          "openSUSE Leap 15.6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
          "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.aarch64",
          "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.ppc64le",
          "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.s390x",
          "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.x86_64",
          "openSUSE Leap 15.6:libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
          "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.aarch64",
          "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.ppc64le",
          "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.s390x",
          "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.x86_64",
          "openSUSE Leap 15.6:openssl-3-doc-3.1.4-150600.5.21.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-50782",
          "url": "https://www.suse.com/security/cve/CVE-2023-50782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218043 for CVE-2023-50782",
          "url": "https://bugzilla.suse.com/1218043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
            "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
            "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-3-devel-32bit-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.aarch64",
            "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.s390x",
            "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.aarch64",
            "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.ppc64le",
            "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.s390x",
            "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:openssl-3-doc-3.1.4-150600.5.21.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.aarch64",
            "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.s390x",
            "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-3-devel-32bit-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.aarch64",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.s390x",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.aarch64",
            "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.s390x",
            "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:libopenssl3-32bit-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.aarch64",
            "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.ppc64le",
            "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.s390x",
            "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.21.1.x86_64",
            "openSUSE Leap 15.6:openssl-3-doc-3.1.4-150600.5.21.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-11-07T10:12:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-50782"
    }
  ]
}
  suse-su-2024:3904-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openssl-1_1",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openssl-1_1 fixes the following issues:\n\n- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3904,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3904,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3904,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3904,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3904,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3904,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3904,SUSE-SUSE-MicroOS-5.1-2024-3904,SUSE-SUSE-MicroOS-5.2-2024-3904,SUSE-Storage-7.1-2024-3904",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3904-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3904-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243904-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3904-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019775.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220262",
        "url": "https://bugzilla.suse.com/1220262"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-50782 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-50782/"
      }
    ],
    "title": "Security update for openssl-1_1",
    "tracking": {
      "current_release_date": "2024-11-04T12:38:42Z",
      "generator": {
        "date": "2024-11-04T12:38:42Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3904-1",
      "initial_release_date": "2024-11-04T12:38:42Z",
      "revision_history": [
        {
          "date": "2024-11-04T12:38:42Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
                  "product_id": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
                "product": {
                  "name": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
                  "product_id": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-64bit-1.1.1d-150200.11.97.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl-1_1-devel-64bit-1.1.1d-150200.11.97.1.aarch64_ilp32",
                  "product_id": "libopenssl-1_1-devel-64bit-1.1.1d-150200.11.97.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-64bit-1.1.1d-150200.11.97.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl1_1-64bit-1.1.1d-150200.11.97.1.aarch64_ilp32",
                  "product_id": "libopenssl1_1-64bit-1.1.1d-150200.11.97.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-64bit-1.1.1d-150200.11.97.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl1_1-hmac-64bit-1.1.1d-150200.11.97.1.aarch64_ilp32",
                  "product_id": "libopenssl1_1-hmac-64bit-1.1.1d-150200.11.97.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.i586",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.i586",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-150200.11.97.1.i586",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-150200.11.97.1.i586",
                  "product_id": "libopenssl1_1-1.1.1d-150200.11.97.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.i586",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.i586",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-150200.11.97.1.i586",
                "product": {
                  "name": "openssl-1_1-1.1.1d-150200.11.97.1.i586",
                  "product_id": "openssl-1_1-1.1.1d-150200.11.97.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
                "product": {
                  "name": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
                  "product_id": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
                  "product_id": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
                "product": {
                  "name": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
                  "product_id": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
                  "product_id": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-150200.11.97.1.s390x",
                "product": {
                  "name": "openssl-1_1-1.1.1d-150200.11.97.1.s390x",
                  "product_id": "openssl-1_1-1.1.1d-150200.11.97.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
                  "product_id": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
                  "product_id": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
                  "product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
                  "product_id": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
                "product": {
                  "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
                  "product_id": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.2",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.2",
                  "product_id": "SUSE Linux Enterprise Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 7.1",
                "product": {
                  "name": "SUSE Enterprise Storage 7.1",
                  "product_id": "SUSE Enterprise Storage 7.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:7.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch"
        },
        "product_reference": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch"
        },
        "product_reference": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch"
        },
        "product_reference": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.97.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.97.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch"
        },
        "product_reference": "openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-50782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Enterprise Storage 7.1:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Enterprise Storage 7.1:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
          "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-50782",
          "url": "https://www.suse.com/security/cve/CVE-2023-50782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218043 for CVE-2023-50782",
          "url": "https://bugzilla.suse.com/1218043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
            "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Enterprise Storage 7.1:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
            "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.97.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.97.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-doc-1.1.1d-150200.11.97.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-11-04T12:38:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-50782"
    }
  ]
}
  suse-su-2024:3872-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openssl-1_1",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openssl-1_1 fixes the following issues:\n\n- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3872,SUSE-SLE-Micro-5.3-2024-3872,SUSE-SLE-Micro-5.4-2024-3872,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3872,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3872,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3872,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3872,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3872",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3872-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3872-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243872-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3872-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019758.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220262",
        "url": "https://bugzilla.suse.com/1220262"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-50782 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-50782/"
      }
    ],
    "title": "Security update for openssl-1_1",
    "tracking": {
      "current_release_date": "2024-11-01T15:20:58Z",
      "generator": {
        "date": "2024-11-01T15:20:58Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3872-1",
      "initial_release_date": "2024-11-01T15:20:58Z",
      "revision_history": [
        {
          "date": "2024-11-01T15:20:58Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
                  "product_id": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
                  "product_id": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-64bit-1.1.1l-150400.7.75.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl-1_1-devel-64bit-1.1.1l-150400.7.75.1.aarch64_ilp32",
                  "product_id": "libopenssl-1_1-devel-64bit-1.1.1l-150400.7.75.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-64bit-1.1.1l-150400.7.75.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl1_1-64bit-1.1.1l-150400.7.75.1.aarch64_ilp32",
                  "product_id": "libopenssl1_1-64bit-1.1.1l-150400.7.75.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-64bit-1.1.1l-150400.7.75.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl1_1-hmac-64bit-1.1.1l-150400.7.75.1.aarch64_ilp32",
                  "product_id": "libopenssl1_1-hmac-64bit-1.1.1l-150400.7.75.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.i586",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.i586",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150400.7.75.1.i586",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150400.7.75.1.i586",
                  "product_id": "libopenssl1_1-1.1.1l-150400.7.75.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.i586",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.i586",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150400.7.75.1.i586",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150400.7.75.1.i586",
                  "product_id": "openssl-1_1-1.1.1l-150400.7.75.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-1_1-doc-1.1.1l-150400.7.75.1.noarch",
                "product": {
                  "name": "openssl-1_1-doc-1.1.1l-150400.7.75.1.noarch",
                  "product_id": "openssl-1_1-doc-1.1.1l-150400.7.75.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
                  "product_id": "libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
                  "product_id": "openssl-1_1-1.1.1l-150400.7.75.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
                  "product_id": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150400.7.75.1.s390x",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150400.7.75.1.s390x",
                  "product_id": "openssl-1_1-1.1.1l-150400.7.75.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
                  "product_id": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
                  "product_id": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
                  "product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
                  "product_id": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
                "product": {
                  "name": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
                  "product_id": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.3",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.3",
                  "product_id": "SUSE Linux Enterprise Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.4",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.4",
                  "product_id": "SUSE Linux Enterprise Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.3",
                "product": {
                  "name": "SUSE Manager Server 4.3",
                  "product_id": "SUSE Manager Server 4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-server:4.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-50782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
          "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
          "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
          "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Manager Server 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
          "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
          "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
          "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-50782",
          "url": "https://www.suse.com/security/cve/CVE-2023-50782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218043 for CVE-2023-50782",
          "url": "https://bugzilla.suse.com/1218043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
            "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
            "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.s390x",
            "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.s390x",
            "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.75.1.x86_64",
            "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.ppc64le",
            "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.s390x",
            "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.75.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-11-01T15:20:58Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-50782"
    }
  ]
}
  suse-su-2024:3766-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openssl-3",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openssl-3 fixes the following issues:\n\n- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)\n- CVE-2024-41996: Avoid expensive public key validation for known safe-prime groups (DHEATATTACK) (bsc#1230698)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3766,SUSE-SLE-Module-Basesystem-15-SP5-2024-3766,openSUSE-SLE-15.5-2024-3766",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3766-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3766-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243766-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3766-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019684.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220262",
        "url": "https://bugzilla.suse.com/1220262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1230698",
        "url": "https://bugzilla.suse.com/1230698"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-50782 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-50782/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-41996 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-41996/"
      }
    ],
    "title": "Security update for openssl-3",
    "tracking": {
      "current_release_date": "2024-10-29T01:34:29Z",
      "generator": {
        "date": "2024-10-29T01:34:29Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3766-1",
      "initial_release_date": "2024-10-29T01:34:29Z",
      "revision_history": [
        {
          "date": "2024-10-29T01:34:29Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
                  "product_id": "libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150500.5.48.1.aarch64",
                "product": {
                  "name": "libopenssl3-3.0.8-150500.5.48.1.aarch64",
                  "product_id": "libopenssl3-3.0.8-150500.5.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150500.5.48.1.aarch64",
                "product": {
                  "name": "openssl-3-3.0.8-150500.5.48.1.aarch64",
                  "product_id": "openssl-3-3.0.8-150500.5.48.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-64bit-3.0.8-150500.5.48.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl-3-devel-64bit-3.0.8-150500.5.48.1.aarch64_ilp32",
                  "product_id": "libopenssl-3-devel-64bit-3.0.8-150500.5.48.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-64bit-3.0.8-150500.5.48.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl3-64bit-3.0.8-150500.5.48.1.aarch64_ilp32",
                  "product_id": "libopenssl3-64bit-3.0.8-150500.5.48.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.i586",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.i586",
                  "product_id": "libopenssl-3-devel-3.0.8-150500.5.48.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150500.5.48.1.i586",
                "product": {
                  "name": "libopenssl3-3.0.8-150500.5.48.1.i586",
                  "product_id": "libopenssl3-3.0.8-150500.5.48.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150500.5.48.1.i586",
                "product": {
                  "name": "openssl-3-3.0.8-150500.5.48.1.i586",
                  "product_id": "openssl-3-3.0.8-150500.5.48.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-3-doc-3.0.8-150500.5.48.1.noarch",
                "product": {
                  "name": "openssl-3-doc-3.0.8-150500.5.48.1.noarch",
                  "product_id": "openssl-3-doc-3.0.8-150500.5.48.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
                  "product_id": "libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150500.5.48.1.ppc64le",
                "product": {
                  "name": "libopenssl3-3.0.8-150500.5.48.1.ppc64le",
                  "product_id": "libopenssl3-3.0.8-150500.5.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150500.5.48.1.ppc64le",
                "product": {
                  "name": "openssl-3-3.0.8-150500.5.48.1.ppc64le",
                  "product_id": "openssl-3-3.0.8-150500.5.48.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
                  "product_id": "libopenssl-3-devel-3.0.8-150500.5.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150500.5.48.1.s390x",
                "product": {
                  "name": "libopenssl3-3.0.8-150500.5.48.1.s390x",
                  "product_id": "libopenssl3-3.0.8-150500.5.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150500.5.48.1.s390x",
                "product": {
                  "name": "openssl-3-3.0.8-150500.5.48.1.s390x",
                  "product_id": "openssl-3-3.0.8-150500.5.48.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
                "product": {
                  "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
                  "product_id": "libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64",
                "product": {
                  "name": "libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64",
                  "product_id": "libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.0.8-150500.5.48.1.x86_64",
                "product": {
                  "name": "libopenssl3-3.0.8-150500.5.48.1.x86_64",
                  "product_id": "libopenssl3-3.0.8-150500.5.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64",
                "product": {
                  "name": "libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64",
                  "product_id": "libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.0.8-150500.5.48.1.x86_64",
                "product": {
                  "name": "openssl-3-3.0.8-150500.5.48.1.x86_64",
                  "product_id": "openssl-3-3.0.8-150500.5.48.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150500.5.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.aarch64"
        },
        "product_reference": "libopenssl3-3.0.8-150500.5.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150500.5.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.ppc64le"
        },
        "product_reference": "libopenssl3-3.0.8-150500.5.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150500.5.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.s390x"
        },
        "product_reference": "libopenssl3-3.0.8-150500.5.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150500.5.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.x86_64"
        },
        "product_reference": "libopenssl3-3.0.8-150500.5.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150500.5.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.aarch64"
        },
        "product_reference": "openssl-3-3.0.8-150500.5.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150500.5.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.ppc64le"
        },
        "product_reference": "openssl-3-3.0.8-150500.5.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150500.5.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.s390x"
        },
        "product_reference": "openssl-3-3.0.8-150500.5.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150500.5.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.x86_64"
        },
        "product_reference": "openssl-3-3.0.8-150500.5.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150500.5.48.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.aarch64"
        },
        "product_reference": "libopenssl3-3.0.8-150500.5.48.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150500.5.48.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.ppc64le"
        },
        "product_reference": "libopenssl3-3.0.8-150500.5.48.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150500.5.48.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.s390x"
        },
        "product_reference": "libopenssl3-3.0.8-150500.5.48.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.0.8-150500.5.48.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.x86_64"
        },
        "product_reference": "libopenssl3-3.0.8-150500.5.48.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64"
        },
        "product_reference": "libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150500.5.48.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.aarch64"
        },
        "product_reference": "openssl-3-3.0.8-150500.5.48.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150500.5.48.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.ppc64le"
        },
        "product_reference": "openssl-3-3.0.8-150500.5.48.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150500.5.48.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.s390x"
        },
        "product_reference": "openssl-3-3.0.8-150500.5.48.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.0.8-150500.5.48.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.x86_64"
        },
        "product_reference": "openssl-3-3.0.8-150500.5.48.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-doc-3.0.8-150500.5.48.1.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.48.1.noarch"
        },
        "product_reference": "openssl-3-doc-3.0.8-150500.5.48.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-50782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
          "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
          "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
          "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
          "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
          "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.s390x",
          "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.aarch64",
          "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
          "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.s390x",
          "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.48.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-50782",
          "url": "https://www.suse.com/security/cve/CVE-2023-50782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218043 for CVE-2023-50782",
          "url": "https://bugzilla.suse.com/1218043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.48.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.48.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-10-29T01:34:29Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2024-41996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-41996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
          "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
          "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
          "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
          "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
          "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.s390x",
          "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.aarch64",
          "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
          "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.s390x",
          "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.x86_64",
          "openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.48.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-41996",
          "url": "https://www.suse.com/security/cve/CVE-2024-41996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1229742 for CVE-2024-41996",
          "url": "https://bugzilla.suse.com/1229742"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.48.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.aarch64",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.ppc64le",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.s390x",
            "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.48.1.x86_64",
            "openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.48.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-10-29T01:34:29Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-41996"
    }
  ]
}
  suse-su-2024:3905-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openssl-1_1",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openssl-1_1 fixes the following issues:\n\nSecurity fixes:\n\n- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)\n\nOther fixes:\n\n- FIPS: AES GCM external IV implementation (bsc#1228618)\n- FIPS: Mark PBKDF2 and HKDF HMAC input keys with size \u003e= 112 bits as approved in the SLI. (bsc#1228623)\n- FIPS: Enforce KDF in FIPS style (bsc#1224270)\n- FIPS: Mark HKDF and TLSv1.3 KDF as approved in the SLI (bsc#1228619)\n- FIPS: The X9.31 scheme is not approved for RSA signature operations in FIPS 186-5. (bsc#1224269)\n- FIPS: Differentiate the PSS length requirements (bsc#1224275)\n- FIPS: Mark sigGen and sigVer primitives as non-approved (bsc#1224272)\n- FIPS: Disable PKCSv1.5 and shake in FIPS mode (bsc#1224271)\n- FIPS: Mark SHA1 as non-approved in the SLI (bsc#1224266)\n- FIPS: DH FIPS selftest and safe prime group (bsc#1224264)\n- FIPS: Remove not needed FIPS DRBG files (bsc#1224268)\n- FIPS: Add Pair-wise Consistency Test when generating DH key (bsc#1224265)\n- FIPS: Disallow non-approved KDF types (bsc#1224267)\n- FIPS: Disallow RSA sigVer with 1024 and ECDSA sigVer/keyVer P-192 (bsc#1224273)\n- FIPS: DRBG component chaining (bsc#1224258)\n- FIPS: Align CRNGT_BUFSIZ with Jitter RNG output size (bsc#1224260)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3905,SUSE-SLE-Module-Basesystem-15-SP6-2024-3905,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3905,SUSE-SLE-Module-Legacy-15-SP6-2024-3905,openSUSE-SLE-15.6-2024-3905",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3905-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3905-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243905-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3905-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019774.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220262",
        "url": "https://bugzilla.suse.com/1220262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224258",
        "url": "https://bugzilla.suse.com/1224258"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224260",
        "url": "https://bugzilla.suse.com/1224260"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224264",
        "url": "https://bugzilla.suse.com/1224264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224265",
        "url": "https://bugzilla.suse.com/1224265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224266",
        "url": "https://bugzilla.suse.com/1224266"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224267",
        "url": "https://bugzilla.suse.com/1224267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224268",
        "url": "https://bugzilla.suse.com/1224268"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224269",
        "url": "https://bugzilla.suse.com/1224269"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224270",
        "url": "https://bugzilla.suse.com/1224270"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224271",
        "url": "https://bugzilla.suse.com/1224271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224272",
        "url": "https://bugzilla.suse.com/1224272"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224273",
        "url": "https://bugzilla.suse.com/1224273"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224275",
        "url": "https://bugzilla.suse.com/1224275"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228618",
        "url": "https://bugzilla.suse.com/1228618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228619",
        "url": "https://bugzilla.suse.com/1228619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228623",
        "url": "https://bugzilla.suse.com/1228623"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-50782 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-50782/"
      }
    ],
    "title": "Security update for openssl-1_1",
    "tracking": {
      "current_release_date": "2024-11-04T12:39:03Z",
      "generator": {
        "date": "2024-11-04T12:39:03Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3905-1",
      "initial_release_date": "2024-11-04T12:39:03Z",
      "revision_history": [
        {
          "date": "2024-11-04T12:39:03Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
                  "product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
                "product": {
                  "name": "libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
                  "product_id": "libopenssl1_1-1.1.1w-150600.5.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
                "product": {
                  "name": "openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
                  "product_id": "openssl-1_1-1.1.1w-150600.5.9.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-64bit-1.1.1w-150600.5.9.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl-1_1-devel-64bit-1.1.1w-150600.5.9.1.aarch64_ilp32",
                  "product_id": "libopenssl-1_1-devel-64bit-1.1.1w-150600.5.9.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-64bit-1.1.1w-150600.5.9.1.aarch64_ilp32",
                "product": {
                  "name": "libopenssl1_1-64bit-1.1.1w-150600.5.9.1.aarch64_ilp32",
                  "product_id": "libopenssl1_1-64bit-1.1.1w-150600.5.9.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.i586",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.i586",
                  "product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1w-150600.5.9.1.i586",
                "product": {
                  "name": "libopenssl1_1-1.1.1w-150600.5.9.1.i586",
                  "product_id": "libopenssl1_1-1.1.1w-150600.5.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1w-150600.5.9.1.i586",
                "product": {
                  "name": "openssl-1_1-1.1.1w-150600.5.9.1.i586",
                  "product_id": "openssl-1_1-1.1.1w-150600.5.9.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-1_1-doc-1.1.1w-150600.5.9.1.noarch",
                "product": {
                  "name": "openssl-1_1-doc-1.1.1w-150600.5.9.1.noarch",
                  "product_id": "openssl-1_1-doc-1.1.1w-150600.5.9.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
                  "product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
                "product": {
                  "name": "libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
                  "product_id": "libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
                "product": {
                  "name": "openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
                  "product_id": "openssl-1_1-1.1.1w-150600.5.9.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
                  "product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
                "product": {
                  "name": "libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
                  "product_id": "libopenssl1_1-1.1.1w-150600.5.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1w-150600.5.9.1.s390x",
                "product": {
                  "name": "openssl-1_1-1.1.1w-150600.5.9.1.s390x",
                  "product_id": "openssl-1_1-1.1.1w-150600.5.9.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1.x86_64",
                "product": {
                  "name": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1.x86_64",
                  "product_id": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
                  "product_id": "libopenssl1_1-1.1.1w-150600.5.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
                "product": {
                  "name": "libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
                  "product_id": "libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
                "product": {
                  "name": "openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
                  "product_id": "openssl-1_1-1.1.1w-150600.5.9.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
                  "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-legacy:15:sp6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.6",
                "product": {
                  "name": "openSUSE Leap 15.6",
                  "product_id": "openSUSE Leap 15.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1w-150600.5.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1w-150600.5.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1w-150600.5.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1w-150600.5.9.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1w-150600.5.9.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1w-150600.5.9.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1w-150600.5.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1w-150600.5.9.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1.x86_64"
        },
        "product_reference": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1w-150600.5.9.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.aarch64"
        },
        "product_reference": "libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le"
        },
        "product_reference": "libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1w-150600.5.9.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.s390x"
        },
        "product_reference": "libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-1.1.1w-150600.5.9.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.x86_64"
        },
        "product_reference": "libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64"
        },
        "product_reference": "libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1w-150600.5.9.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.aarch64"
        },
        "product_reference": "openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1w-150600.5.9.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.ppc64le"
        },
        "product_reference": "openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1w-150600.5.9.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.s390x"
        },
        "product_reference": "openssl-1_1-1.1.1w-150600.5.9.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-1.1.1w-150600.5.9.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.x86_64"
        },
        "product_reference": "openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1_1-doc-1.1.1w-150600.5.9.1.noarch as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:openssl-1_1-doc-1.1.1w-150600.5.9.1.noarch"
        },
        "product_reference": "openssl-1_1-doc-1.1.1w-150600.5.9.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-50782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
          "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
          "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
          "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
          "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
          "openSUSE Leap 15.6:libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1.x86_64",
          "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
          "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
          "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
          "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
          "openSUSE Leap 15.6:libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
          "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
          "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
          "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.s390x",
          "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
          "openSUSE Leap 15.6:openssl-1_1-doc-1.1.1w-150600.5.9.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-50782",
          "url": "https://www.suse.com/security/cve/CVE-2023-50782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218043 for CVE-2023-50782",
          "url": "https://bugzilla.suse.com/1218043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
            "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
            "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
            "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
            "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.s390x",
            "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:openssl-1_1-doc-1.1.1w-150600.5.9.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.aarch64",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.s390x",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.aarch64",
            "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.ppc64le",
            "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.s390x",
            "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:libopenssl1_1-32bit-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.aarch64",
            "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.ppc64le",
            "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.s390x",
            "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.9.1.x86_64",
            "openSUSE Leap 15.6:openssl-1_1-doc-1.1.1w-150600.5.9.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-11-04T12:39:03Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-50782"
    }
  ]
}
  wid-sec-w-2024-3377
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen und um nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3377 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3377 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377"
      },
      {
        "category": "external",
        "summary": "Dell Security Update",
        "url": "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability"
      },
      {
        "category": "external",
        "summary": "Security Update for Dell PowerProtect Data Domain",
        "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
      }
    ],
    "source_lang": "en-US",
    "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:21:01.974+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2024-3377",
      "initial_release_date": "2024-11-07T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-11-07T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.1.0.0",
                  "product_id": "T038861"
                }
              },
              {
                "category": "product_version",
                "name": "8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.1.0.0",
                  "product_id": "T038861-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.1.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.10",
                  "product_id": "T038862"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.10",
                  "product_id": "T038862-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.40",
                  "product_id": "T038863"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.40",
                  "product_id": "T038863-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.7.5.50",
                  "product_id": "T038864"
                }
              },
              {
                "category": "product_version",
                "name": "7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.7.5.50",
                  "product_id": "T038864-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.7.5.50"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Dell PowerProtect Data Domain",
                "product": {
                  "name": "Dell PowerProtect Data Domain",
                  "product_id": "T045852",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain Management Center",
            "product": {
              "name": "Dell PowerProtect Data Domain Management Center",
              "product_id": "T045853",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain OS",
            "product": {
              "name": "Dell PowerProtect Data Domain OS",
              "product_id": "T045854",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-45759",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-45759"
    },
    {
      "cve": "CVE-2024-48010",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48010"
    },
    {
      "cve": "CVE-2024-48011",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48011"
    },
    {
      "cve": "CVE-2017-16829",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-16829"
    },
    {
      "cve": "CVE-2017-5849",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-5849"
    },
    {
      "cve": "CVE-2018-7208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2018-7208"
    },
    {
      "cve": "CVE-2019-14889",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2019-14889"
    },
    {
      "cve": "CVE-2020-12912",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-12912"
    },
    {
      "cve": "CVE-2020-16135",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-16135"
    },
    {
      "cve": "CVE-2020-1730",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-1730"
    },
    {
      "cve": "CVE-2020-24455",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-24455"
    },
    {
      "cve": "CVE-2020-8694",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8694"
    },
    {
      "cve": "CVE-2020-8695",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8695"
    },
    {
      "cve": "CVE-2021-27219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-3565",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3565"
    },
    {
      "cve": "CVE-2021-3634",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3634"
    },
    {
      "cve": "CVE-2022-1210",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1210"
    },
    {
      "cve": "CVE-2022-1622",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1622"
    },
    {
      "cve": "CVE-2022-1996",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1996"
    },
    {
      "cve": "CVE-2022-22576",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-22576"
    },
    {
      "cve": "CVE-2022-25313",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-27774",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27774"
    },
    {
      "cve": "CVE-2022-27775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27775"
    },
    {
      "cve": "CVE-2022-27776",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27776"
    },
    {
      "cve": "CVE-2022-27781",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27781"
    },
    {
      "cve": "CVE-2022-27782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27782"
    },
    {
      "cve": "CVE-2022-29361",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-29361"
    },
    {
      "cve": "CVE-2022-32205",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32221",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32221"
    },
    {
      "cve": "CVE-2022-35252",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40090",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40090"
    },
    {
      "cve": "CVE-2022-42915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42915"
    },
    {
      "cve": "CVE-2022-42916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42916"
    },
    {
      "cve": "CVE-2022-43551",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43551"
    },
    {
      "cve": "CVE-2022-43552",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43552"
    },
    {
      "cve": "CVE-2022-4603",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-4603"
    },
    {
      "cve": "CVE-2022-48064",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48064"
    },
    {
      "cve": "CVE-2022-48624",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48624"
    },
    {
      "cve": "CVE-2023-0461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-0461"
    },
    {
      "cve": "CVE-2023-1667",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1667"
    },
    {
      "cve": "CVE-2023-1916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1916"
    },
    {
      "cve": "CVE-2023-20592",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-20592"
    },
    {
      "cve": "CVE-2023-2137",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2137"
    },
    {
      "cve": "CVE-2023-22745",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-22745"
    },
    {
      "cve": "CVE-2023-2283",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2283"
    },
    {
      "cve": "CVE-2023-23914",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23914"
    },
    {
      "cve": "CVE-2023-23915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23915"
    },
    {
      "cve": "CVE-2023-23916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23916"
    },
    {
      "cve": "CVE-2023-23934",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23934"
    },
    {
      "cve": "CVE-2023-25577",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-25577"
    },
    {
      "cve": "CVE-2023-26965",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-26965"
    },
    {
      "cve": "CVE-2023-27043",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27043"
    },
    {
      "cve": "CVE-2023-2731",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2731"
    },
    {
      "cve": "CVE-2023-27533",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27533"
    },
    {
      "cve": "CVE-2023-27534",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27534"
    },
    {
      "cve": "CVE-2023-27535",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27535"
    },
    {
      "cve": "CVE-2023-27536",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27536"
    },
    {
      "cve": "CVE-2023-27538",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27538"
    },
    {
      "cve": "CVE-2023-28319",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28319"
    },
    {
      "cve": "CVE-2023-28320",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28320"
    },
    {
      "cve": "CVE-2023-28321",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28321"
    },
    {
      "cve": "CVE-2023-28322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28322"
    },
    {
      "cve": "CVE-2023-31083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-31083"
    },
    {
      "cve": "CVE-2023-34055",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-34055"
    },
    {
      "cve": "CVE-2023-35116",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-35116"
    },
    {
      "cve": "CVE-2023-38286",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38286"
    },
    {
      "cve": "CVE-2023-38469",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38469"
    },
    {
      "cve": "CVE-2023-38471",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38471"
    },
    {
      "cve": "CVE-2023-38472",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38472"
    },
    {
      "cve": "CVE-2023-38545",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-39197",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39197"
    },
    {
      "cve": "CVE-2023-39198",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39198"
    },
    {
      "cve": "CVE-2023-39804",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39804"
    },
    {
      "cve": "CVE-2023-40217",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-40217"
    },
    {
      "cve": "CVE-2023-42465",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-42465"
    },
    {
      "cve": "CVE-2023-4255",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-4255"
    },
    {
      "cve": "CVE-2023-45139",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45139"
    },
    {
      "cve": "CVE-2023-45322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45322"
    },
    {
      "cve": "CVE-2023-45863",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45863"
    },
    {
      "cve": "CVE-2023-45871",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45871"
    },
    {
      "cve": "CVE-2023-46136",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-46218",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-46751",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46751"
    },
    {
      "cve": "CVE-2023-48795",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-49083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-49083"
    },
    {
      "cve": "CVE-2023-50447",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50447"
    },
    {
      "cve": "CVE-2023-5049",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5049"
    },
    {
      "cve": "CVE-2023-50495",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50495"
    },
    {
      "cve": "CVE-2023-50782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2023-51257",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-51257"
    },
    {
      "cve": "CVE-2023-52425",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-5678",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5717",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5717"
    },
    {
      "cve": "CVE-2023-5752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5752"
    },
    {
      "cve": "CVE-2023-6004",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6004"
    },
    {
      "cve": "CVE-2023-6597",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6918",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6918"
    },
    {
      "cve": "CVE-2023-7207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-7207"
    },
    {
      "cve": "CVE-2024-0450",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0727",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-0985",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0985"
    },
    {
      "cve": "CVE-2024-21626",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-21626"
    },
    {
      "cve": "CVE-2024-22195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-22365",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22365"
    },
    {
      "cve": "CVE-2024-23651",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23651"
    },
    {
      "cve": "CVE-2024-23652",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23652"
    },
    {
      "cve": "CVE-2024-23653",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23653"
    },
    {
      "cve": "CVE-2024-23672",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-24549",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-24549"
    },
    {
      "cve": "CVE-2024-25062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-26130",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26130"
    },
    {
      "cve": "CVE-2024-26458",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-28085",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-28182",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28219"
    },
    {
      "cve": "CVE-2024-28757",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28757"
    }
  ]
}
  wid-sec-w-2025-0225
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erh\u00f6hte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2025-0225 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0225.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2025-0225 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0225"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2025-022 vom 2025-01-30",
        "url": "https://www.dell.com/support/kbdoc/de-de/000279157/dsa-2025-022-security-update-for-dell-powerprotect-dd-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2025-2804 vom 2025-04-02",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2804.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
        "url": "https://ubuntu.com/security/notices/USN-7429-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
        "url": "https://ubuntu.com/security/notices/USN-7429-1"
      },
      {
        "category": "external",
        "summary": "Security Update for Dell PowerProtect Data Domain",
        "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
      }
    ],
    "source_lang": "en-US",
    "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:21:04.568+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2025-0225",
      "initial_release_date": "2025-01-30T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2025-01-30T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-04-01T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-04-09T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.3.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.3.0.0",
                  "product_id": "T040718"
                }
              },
              {
                "category": "product_version",
                "name": "8.3.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.3.0.0",
                  "product_id": "T040718-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.20",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.20",
                  "product_id": "T040719"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.20",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.20",
                  "product_id": "T040719-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.20"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.50",
                  "product_id": "T040721"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.50",
                  "product_id": "T040721-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.50"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Dell PowerProtect Data Domain",
                "product": {
                  "name": "Dell PowerProtect Data Domain",
                  "product_id": "T045852",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain Management Center",
            "product": {
              "name": "Dell PowerProtect Data Domain Management Center",
              "product_id": "T045853",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain OS",
            "product": {
              "name": "Dell PowerProtect Data Domain OS",
              "product_id": "T045854",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2013-4235",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2013-4235"
    },
    {
      "cve": "CVE-2015-8100",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2015-8100"
    },
    {
      "cve": "CVE-2017-9271",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2017-9271"
    },
    {
      "cve": "CVE-2018-6798",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2018-6798"
    },
    {
      "cve": "CVE-2018-6913",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2018-6913"
    },
    {
      "cve": "CVE-2019-20633",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2019-20633"
    },
    {
      "cve": "CVE-2019-20892",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2019-20892"
    },
    {
      "cve": "CVE-2020-12762",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2020-12762"
    },
    {
      "cve": "CVE-2020-15861",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2020-15861"
    },
    {
      "cve": "CVE-2020-15862",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2020-15862"
    },
    {
      "cve": "CVE-2021-3521",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-3521"
    },
    {
      "cve": "CVE-2021-37750",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-37750"
    },
    {
      "cve": "CVE-2021-46933",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-46933"
    },
    {
      "cve": "CVE-2021-46955",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-46955"
    },
    {
      "cve": "CVE-2021-47074",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47074"
    },
    {
      "cve": "CVE-2021-47113",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47113"
    },
    {
      "cve": "CVE-2021-47131",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47131"
    },
    {
      "cve": "CVE-2021-47162",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47162"
    },
    {
      "cve": "CVE-2021-47171",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47171"
    },
    {
      "cve": "CVE-2021-47188",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47188"
    },
    {
      "cve": "CVE-2021-47206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47206"
    },
    {
      "cve": "CVE-2021-47220",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47220"
    },
    {
      "cve": "CVE-2021-47229",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47229"
    },
    {
      "cve": "CVE-2021-47231",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47231"
    },
    {
      "cve": "CVE-2021-47235",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47235"
    },
    {
      "cve": "CVE-2022-2601",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-2601"
    },
    {
      "cve": "CVE-2022-3775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-3775"
    },
    {
      "cve": "CVE-2022-44792",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-44792"
    },
    {
      "cve": "CVE-2022-44793",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-44793"
    },
    {
      "cve": "CVE-2022-48566",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-48566"
    },
    {
      "cve": "CVE-2023-27043",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-27043"
    },
    {
      "cve": "CVE-2023-28074",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-28074"
    },
    {
      "cve": "CVE-2023-3164",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-3164"
    },
    {
      "cve": "CVE-2023-36632",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-36632"
    },
    {
      "cve": "CVE-2023-4421",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-4421"
    },
    {
      "cve": "CVE-2023-44487",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-45288",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-45288"
    },
    {
      "cve": "CVE-2023-45733",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-45733"
    },
    {
      "cve": "CVE-2023-45745",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-45745"
    },
    {
      "cve": "CVE-2023-45918",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-45918"
    },
    {
      "cve": "CVE-2023-46103",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-46103"
    },
    {
      "cve": "CVE-2023-4692",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-4692"
    },
    {
      "cve": "CVE-2023-47233",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-47233"
    },
    {
      "cve": "CVE-2023-47855",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-47855"
    },
    {
      "cve": "CVE-2023-49083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-49083"
    },
    {
      "cve": "CVE-2023-50782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2023-52425",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-52428",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52428"
    },
    {
      "cve": "CVE-2023-52527",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52527"
    },
    {
      "cve": "CVE-2023-52586",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52586"
    },
    {
      "cve": "CVE-2023-52591",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52591"
    },
    {
      "cve": "CVE-2023-52646",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52646"
    },
    {
      "cve": "CVE-2023-52653",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52653"
    },
    {
      "cve": "CVE-2023-52655",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52655"
    },
    {
      "cve": "CVE-2023-52664",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52664"
    },
    {
      "cve": "CVE-2023-52685",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52685"
    },
    {
      "cve": "CVE-2023-52686",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52686"
    },
    {
      "cve": "CVE-2023-52691",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52691"
    },
    {
      "cve": "CVE-2023-52696",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52696"
    },
    {
      "cve": "CVE-2023-52698",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52698"
    },
    {
      "cve": "CVE-2023-52703",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52703"
    },
    {
      "cve": "CVE-2023-52730",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52730"
    },
    {
      "cve": "CVE-2023-52732",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52732"
    },
    {
      "cve": "CVE-2023-52741",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52741"
    },
    {
      "cve": "CVE-2023-52742",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52742"
    },
    {
      "cve": "CVE-2023-52747",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52747"
    },
    {
      "cve": "CVE-2023-52759",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52759"
    },
    {
      "cve": "CVE-2023-52774",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52774"
    },
    {
      "cve": "CVE-2023-52781",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52781"
    },
    {
      "cve": "CVE-2023-52796",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52796"
    },
    {
      "cve": "CVE-2023-52803",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52803"
    },
    {
      "cve": "CVE-2023-52821",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52821"
    },
    {
      "cve": "CVE-2023-52864",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52864"
    },
    {
      "cve": "CVE-2023-52865",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52865"
    },
    {
      "cve": "CVE-2023-52867",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52867"
    },
    {
      "cve": "CVE-2023-52875",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52875"
    },
    {
      "cve": "CVE-2023-52880",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52880"
    },
    {
      "cve": "CVE-2023-5388",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-5388"
    },
    {
      "cve": "CVE-2023-5752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-5752"
    },
    {
      "cve": "CVE-2023-5992",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-5992"
    },
    {
      "cve": "CVE-2023-6597",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2024-0397",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-0397"
    },
    {
      "cve": "CVE-2024-0450",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0639",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-0639"
    },
    {
      "cve": "CVE-2024-0727",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-1737",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-1737"
    },
    {
      "cve": "CVE-2024-1975",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-1975"
    },
    {
      "cve": "CVE-2024-2004",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-2004"
    },
    {
      "cve": "CVE-2024-20696",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-20696"
    },
    {
      "cve": "CVE-2024-22195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-2398",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-24577",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-24577"
    },
    {
      "cve": "CVE-2024-24790",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-24790"
    },
    {
      "cve": "CVE-2024-2511",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-2511"
    },
    {
      "cve": "CVE-2024-25710",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-25710"
    },
    {
      "cve": "CVE-2024-26130",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26130"
    },
    {
      "cve": "CVE-2024-26458",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-26625",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26625"
    },
    {
      "cve": "CVE-2024-26739",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26739"
    },
    {
      "cve": "CVE-2024-26752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26752"
    },
    {
      "cve": "CVE-2024-26775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26775"
    },
    {
      "cve": "CVE-2024-26791",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26791"
    },
    {
      "cve": "CVE-2024-26828",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26828"
    },
    {
      "cve": "CVE-2024-26846",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26846"
    },
    {
      "cve": "CVE-2024-26874",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26874"
    },
    {
      "cve": "CVE-2024-26876",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26876"
    },
    {
      "cve": "CVE-2024-26900",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26900"
    },
    {
      "cve": "CVE-2024-26915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26915"
    },
    {
      "cve": "CVE-2024-26920",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26920"
    },
    {
      "cve": "CVE-2024-26921",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26921"
    },
    {
      "cve": "CVE-2024-26929",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26929"
    },
    {
      "cve": "CVE-2024-26930",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26930"
    },
    {
      "cve": "CVE-2024-26931",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26931"
    },
    {
      "cve": "CVE-2024-26934",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26934"
    },
    {
      "cve": "CVE-2024-26957",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26957"
    },
    {
      "cve": "CVE-2024-26958",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26958"
    },
    {
      "cve": "CVE-2024-26984",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26984"
    },
    {
      "cve": "CVE-2024-26996",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26996"
    },
    {
      "cve": "CVE-2024-27008",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27008"
    },
    {
      "cve": "CVE-2024-27054",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27054"
    },
    {
      "cve": "CVE-2024-27059",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27059"
    },
    {
      "cve": "CVE-2024-27062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27062"
    },
    {
      "cve": "CVE-2024-27388",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27388"
    },
    {
      "cve": "CVE-2024-27396",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27396"
    },
    {
      "cve": "CVE-2024-27398",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27398"
    },
    {
      "cve": "CVE-2024-27401",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27401"
    },
    {
      "cve": "CVE-2024-27419",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27419"
    },
    {
      "cve": "CVE-2024-27436",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27436"
    },
    {
      "cve": "CVE-2024-28085",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-28182",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-2961",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-32487",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-32487"
    },
    {
      "cve": "CVE-2024-33599",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-33871",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33871"
    },
    {
      "cve": "CVE-2024-34062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-34062"
    },
    {
      "cve": "CVE-2024-34064",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-34064"
    },
    {
      "cve": "CVE-2024-34459",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-34459"
    },
    {
      "cve": "CVE-2024-35195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35195"
    },
    {
      "cve": "CVE-2024-35235",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35235"
    },
    {
      "cve": "CVE-2024-35789",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35789"
    },
    {
      "cve": "CVE-2024-35791",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35791"
    },
    {
      "cve": "CVE-2024-35809",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35809"
    },
    {
      "cve": "CVE-2024-35811",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35811"
    },
    {
      "cve": "CVE-2024-35830",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35830"
    },
    {
      "cve": "CVE-2024-35849",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35849"
    },
    {
      "cve": "CVE-2024-35877",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35877"
    },
    {
      "cve": "CVE-2024-35878",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35878"
    },
    {
      "cve": "CVE-2024-35887",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35887"
    },
    {
      "cve": "CVE-2024-35895",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35895"
    },
    {
      "cve": "CVE-2024-35914",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35914"
    },
    {
      "cve": "CVE-2024-35932",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35932"
    },
    {
      "cve": "CVE-2024-35935",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35935"
    },
    {
      "cve": "CVE-2024-35936",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35936"
    },
    {
      "cve": "CVE-2024-35944",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35944"
    },
    {
      "cve": "CVE-2024-35955",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35955"
    },
    {
      "cve": "CVE-2024-35969",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35969"
    },
    {
      "cve": "CVE-2024-35982",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35982"
    },
    {
      "cve": "CVE-2024-36015",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-36015"
    },
    {
      "cve": "CVE-2024-36029",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-36029"
    },
    {
      "cve": "CVE-2024-3651",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-3651"
    },
    {
      "cve": "CVE-2024-36954",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-36954"
    },
    {
      "cve": "CVE-2024-37370",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-37891",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38428",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-38428"
    },
    {
      "cve": "CVE-2024-39689",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-39689"
    },
    {
      "cve": "CVE-2024-4032",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-4032"
    },
    {
      "cve": "CVE-2024-41110",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-41110"
    },
    {
      "cve": "CVE-2024-4317",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-4317"
    },
    {
      "cve": "CVE-2024-4741",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-4741"
    },
    {
      "cve": "CVE-2024-5206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-5206"
    },
    {
      "cve": "CVE-2024-5535",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-6232",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-6232"
    },
    {
      "cve": "CVE-2024-6345",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-6345"
    },
    {
      "cve": "CVE-2024-6655",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-6655"
    },
    {
      "cve": "CVE-2024-7264",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-7264"
    },
    {
      "cve": "CVE-2024-7592",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-7592"
    },
    {
      "cve": "CVE-2024-53295",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-53295"
    },
    {
      "cve": "CVE-2024-51534",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-51534"
    },
    {
      "cve": "CVE-2024-53296",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-53296"
    }
  ]
}
  WID-SEC-W-2024-3377
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen und um nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3377 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3377 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377"
      },
      {
        "category": "external",
        "summary": "Dell Security Update",
        "url": "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability"
      },
      {
        "category": "external",
        "summary": "Security Update for Dell PowerProtect Data Domain",
        "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
      }
    ],
    "source_lang": "en-US",
    "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:21:01.974+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2024-3377",
      "initial_release_date": "2024-11-07T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-11-07T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.1.0.0",
                  "product_id": "T038861"
                }
              },
              {
                "category": "product_version",
                "name": "8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.1.0.0",
                  "product_id": "T038861-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.1.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.10",
                  "product_id": "T038862"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.10",
                  "product_id": "T038862-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.40",
                  "product_id": "T038863"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.40",
                  "product_id": "T038863-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.7.5.50",
                  "product_id": "T038864"
                }
              },
              {
                "category": "product_version",
                "name": "7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.7.5.50",
                  "product_id": "T038864-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.7.5.50"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Dell PowerProtect Data Domain",
                "product": {
                  "name": "Dell PowerProtect Data Domain",
                  "product_id": "T045852",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain Management Center",
            "product": {
              "name": "Dell PowerProtect Data Domain Management Center",
              "product_id": "T045853",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain OS",
            "product": {
              "name": "Dell PowerProtect Data Domain OS",
              "product_id": "T045854",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-45759",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-45759"
    },
    {
      "cve": "CVE-2024-48010",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48010"
    },
    {
      "cve": "CVE-2024-48011",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48011"
    },
    {
      "cve": "CVE-2017-16829",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-16829"
    },
    {
      "cve": "CVE-2017-5849",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-5849"
    },
    {
      "cve": "CVE-2018-7208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2018-7208"
    },
    {
      "cve": "CVE-2019-14889",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2019-14889"
    },
    {
      "cve": "CVE-2020-12912",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-12912"
    },
    {
      "cve": "CVE-2020-16135",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-16135"
    },
    {
      "cve": "CVE-2020-1730",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-1730"
    },
    {
      "cve": "CVE-2020-24455",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-24455"
    },
    {
      "cve": "CVE-2020-8694",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8694"
    },
    {
      "cve": "CVE-2020-8695",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8695"
    },
    {
      "cve": "CVE-2021-27219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-3565",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3565"
    },
    {
      "cve": "CVE-2021-3634",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3634"
    },
    {
      "cve": "CVE-2022-1210",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1210"
    },
    {
      "cve": "CVE-2022-1622",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1622"
    },
    {
      "cve": "CVE-2022-1996",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1996"
    },
    {
      "cve": "CVE-2022-22576",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-22576"
    },
    {
      "cve": "CVE-2022-25313",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-27774",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27774"
    },
    {
      "cve": "CVE-2022-27775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27775"
    },
    {
      "cve": "CVE-2022-27776",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27776"
    },
    {
      "cve": "CVE-2022-27781",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27781"
    },
    {
      "cve": "CVE-2022-27782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27782"
    },
    {
      "cve": "CVE-2022-29361",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-29361"
    },
    {
      "cve": "CVE-2022-32205",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32221",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32221"
    },
    {
      "cve": "CVE-2022-35252",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40090",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40090"
    },
    {
      "cve": "CVE-2022-42915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42915"
    },
    {
      "cve": "CVE-2022-42916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42916"
    },
    {
      "cve": "CVE-2022-43551",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43551"
    },
    {
      "cve": "CVE-2022-43552",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43552"
    },
    {
      "cve": "CVE-2022-4603",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-4603"
    },
    {
      "cve": "CVE-2022-48064",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48064"
    },
    {
      "cve": "CVE-2022-48624",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48624"
    },
    {
      "cve": "CVE-2023-0461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-0461"
    },
    {
      "cve": "CVE-2023-1667",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1667"
    },
    {
      "cve": "CVE-2023-1916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1916"
    },
    {
      "cve": "CVE-2023-20592",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-20592"
    },
    {
      "cve": "CVE-2023-2137",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2137"
    },
    {
      "cve": "CVE-2023-22745",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-22745"
    },
    {
      "cve": "CVE-2023-2283",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2283"
    },
    {
      "cve": "CVE-2023-23914",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23914"
    },
    {
      "cve": "CVE-2023-23915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23915"
    },
    {
      "cve": "CVE-2023-23916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23916"
    },
    {
      "cve": "CVE-2023-23934",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23934"
    },
    {
      "cve": "CVE-2023-25577",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-25577"
    },
    {
      "cve": "CVE-2023-26965",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-26965"
    },
    {
      "cve": "CVE-2023-27043",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27043"
    },
    {
      "cve": "CVE-2023-2731",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2731"
    },
    {
      "cve": "CVE-2023-27533",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27533"
    },
    {
      "cve": "CVE-2023-27534",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27534"
    },
    {
      "cve": "CVE-2023-27535",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27535"
    },
    {
      "cve": "CVE-2023-27536",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27536"
    },
    {
      "cve": "CVE-2023-27538",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27538"
    },
    {
      "cve": "CVE-2023-28319",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28319"
    },
    {
      "cve": "CVE-2023-28320",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28320"
    },
    {
      "cve": "CVE-2023-28321",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28321"
    },
    {
      "cve": "CVE-2023-28322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28322"
    },
    {
      "cve": "CVE-2023-31083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-31083"
    },
    {
      "cve": "CVE-2023-34055",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-34055"
    },
    {
      "cve": "CVE-2023-35116",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-35116"
    },
    {
      "cve": "CVE-2023-38286",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38286"
    },
    {
      "cve": "CVE-2023-38469",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38469"
    },
    {
      "cve": "CVE-2023-38471",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38471"
    },
    {
      "cve": "CVE-2023-38472",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38472"
    },
    {
      "cve": "CVE-2023-38545",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-39197",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39197"
    },
    {
      "cve": "CVE-2023-39198",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39198"
    },
    {
      "cve": "CVE-2023-39804",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39804"
    },
    {
      "cve": "CVE-2023-40217",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-40217"
    },
    {
      "cve": "CVE-2023-42465",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-42465"
    },
    {
      "cve": "CVE-2023-4255",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-4255"
    },
    {
      "cve": "CVE-2023-45139",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45139"
    },
    {
      "cve": "CVE-2023-45322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45322"
    },
    {
      "cve": "CVE-2023-45863",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45863"
    },
    {
      "cve": "CVE-2023-45871",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45871"
    },
    {
      "cve": "CVE-2023-46136",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-46218",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-46751",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46751"
    },
    {
      "cve": "CVE-2023-48795",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-49083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-49083"
    },
    {
      "cve": "CVE-2023-50447",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50447"
    },
    {
      "cve": "CVE-2023-5049",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5049"
    },
    {
      "cve": "CVE-2023-50495",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50495"
    },
    {
      "cve": "CVE-2023-50782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2023-51257",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-51257"
    },
    {
      "cve": "CVE-2023-52425",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-5678",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5717",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5717"
    },
    {
      "cve": "CVE-2023-5752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5752"
    },
    {
      "cve": "CVE-2023-6004",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6004"
    },
    {
      "cve": "CVE-2023-6597",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6918",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6918"
    },
    {
      "cve": "CVE-2023-7207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-7207"
    },
    {
      "cve": "CVE-2024-0450",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0727",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-0985",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0985"
    },
    {
      "cve": "CVE-2024-21626",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-21626"
    },
    {
      "cve": "CVE-2024-22195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-22365",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22365"
    },
    {
      "cve": "CVE-2024-23651",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23651"
    },
    {
      "cve": "CVE-2024-23652",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23652"
    },
    {
      "cve": "CVE-2024-23653",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23653"
    },
    {
      "cve": "CVE-2024-23672",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-24549",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-24549"
    },
    {
      "cve": "CVE-2024-25062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-26130",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26130"
    },
    {
      "cve": "CVE-2024-26458",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-28085",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-28182",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28219"
    },
    {
      "cve": "CVE-2024-28757",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28757"
    }
  ]
}
  ncsc-2025-0028
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft kwetsbaarheden verholpen in Oracle Analytics producten, zoals Business Intelligence, Analytics Desktop en BI Publisher.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of zich toegang te verschaffen tot gevoelige gegevens.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Uncaught Exception",
        "title": "CWE-248"
      },
      {
        "category": "general",
        "text": "Uncontrolled Recursion",
        "title": "CWE-674"
      },
      {
        "category": "general",
        "text": "Improper Restriction of XML External Entity Reference",
        "title": "CWE-611"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Memory Allocation with Excessive Size Value",
        "title": "CWE-789"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
        "title": "CWE-79"
      },
      {
        "category": "general",
        "text": "Dependency on Vulnerable Third-Party Component",
        "title": "CWE-1395"
      },
      {
        "category": "general",
        "text": "Always-Incorrect Control Flow Implementation",
        "title": "CWE-670"
      },
      {
        "category": "general",
        "text": "CWE-399",
        "title": "CWE-399"
      },
      {
        "category": "general",
        "text": "Inadequate Encryption Strength",
        "title": "CWE-326"
      },
      {
        "category": "general",
        "text": "Incorrect Resource Transfer Between Spheres",
        "title": "CWE-669"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
        "title": "CWE-776"
      },
      {
        "category": "general",
        "text": "Excessive Iteration",
        "title": "CWE-834"
      },
      {
        "category": "general",
        "text": "Missing Encryption of Sensitive Data",
        "title": "CWE-311"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Inefficient Regular Expression Complexity",
        "title": "CWE-1333"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd; oracle",
        "url": "https://www.oracle.com/security-alerts/cpujan2025.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle Analytics",
    "tracking": {
      "current_release_date": "2025-01-22T13:36:58.196605Z",
      "id": "NCSC-2025-0028",
      "initial_release_date": "2025-01-22T13:36:58.196605Z",
      "revision_history": [
        {
          "date": "2025-01-22T13:36:58.196605Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "business_intelligence",
            "product": {
              "name": "business_intelligence",
              "product_id": "CSAFPID-1503296",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence",
            "product": {
              "name": "business_intelligence",
              "product_id": "CSAFPID-220360",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:*:enterprise:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence",
            "product": {
              "name": "business_intelligence",
              "product_id": "CSAFPID-135810",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence",
            "product": {
              "name": "business_intelligence",
              "product_id": "CSAFPID-219994",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:enterprise:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence",
            "product": {
              "name": "business_intelligence",
              "product_id": "CSAFPID-219817",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence:6.4.0.0.0:enterprise:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence",
            "product": {
              "name": "business_intelligence",
              "product_id": "CSAFPID-1503297",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence",
            "product": {
              "name": "business_intelligence",
              "product_id": "CSAFPID-257324",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:enterprise:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence",
            "product": {
              "name": "business_intelligence",
              "product_id": "CSAFPID-1503298",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence:7.6.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence",
            "product": {
              "name": "business_intelligence",
              "product_id": "CSAFPID-1650736",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence:7.6.0.0.0:*:*:*:enterprise:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-765384",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:12.2.1.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764234",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:12.2.1.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-765387",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.5.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764778",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764929",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.9.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764235",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:6.4.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764930",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:6.4.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764236",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:7.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-1503574",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:7.6.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-1503573",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___12.2.1.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-765388",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___5.9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764727",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___6.4.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764729",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___7.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-765383",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___12.2.1.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-765385",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___12.2.1.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-765389",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___5.9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764725",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___12.2.1.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764728",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___6.4.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764730",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___7.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-764726",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_service_administration_ui___12.2.1.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "business_intelligence_enterprise_edition",
            "product": {
              "name": "business_intelligence_enterprise_edition",
              "product_id": "CSAFPID-765386",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_storage_service_integration___12.2.1.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "bi_publisher",
            "product": {
              "name": "bi_publisher",
              "product_id": "CSAFPID-9197",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "bi_publisher",
            "product": {
              "name": "bi_publisher",
              "product_id": "CSAFPID-9493",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "bi_publisher",
            "product": {
              "name": "bi_publisher",
              "product_id": "CSAFPID-220546",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:bi_publisher:5.9.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "bi_publisher",
            "product": {
              "name": "bi_publisher",
              "product_id": "CSAFPID-228391",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:bi_publisher:5.9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "bi_publisher",
            "product": {
              "name": "bi_publisher",
              "product_id": "CSAFPID-220545",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:bi_publisher:6.4.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "bi_publisher",
            "product": {
              "name": "bi_publisher",
              "product_id": "CSAFPID-220560",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:bi_publisher:7.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "bi_publisher",
            "product": {
              "name": "bi_publisher",
              "product_id": "CSAFPID-1673195",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:bi_publisher:7.6.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "analytics_desktop",
            "product": {
              "name": "analytics_desktop",
              "product_id": "CSAFPID-816763",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:analytics_desktop:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "analytics_desktop",
            "product": {
              "name": "analytics_desktop",
              "product_id": "CSAFPID-816761",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:analytics_desktop:6.4.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "analytics_desktop",
            "product": {
              "name": "analytics_desktop",
              "product_id": "CSAFPID-816762",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:analytics_desktop:7.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "analytics_desktop",
            "product": {
              "name": "analytics_desktop",
              "product_id": "CSAFPID-1751172",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:analytics_desktop:8.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "analytics_desktop",
            "product": {
              "name": "analytics_desktop",
              "product_id": "CSAFPID-1650735",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:analytics_desktop:prior_to_7.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "analytics_desktop",
            "product": {
              "name": "analytics_desktop",
              "product_id": "CSAFPID-1751157",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:analytics_desktop:prior_to_8.1.0:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "oracle"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-10000",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2016-10000",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2016/CVE-2016-10000.json"
        }
      ],
      "title": "CVE-2016-10000"
    },
    {
      "cve": "CVE-2020-2849",
      "product_status": {
        "known_affected": [
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-2849",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-2849.json"
        }
      ],
      "title": "CVE-2020-2849"
    },
    {
      "cve": "CVE-2020-7760",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-220545",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764235",
          "CSAFPID-764236",
          "CSAFPID-764725",
          "CSAFPID-764726",
          "CSAFPID-764727",
          "CSAFPID-764728",
          "CSAFPID-764729",
          "CSAFPID-764730",
          "CSAFPID-765383",
          "CSAFPID-765384",
          "CSAFPID-765385",
          "CSAFPID-765386",
          "CSAFPID-765387",
          "CSAFPID-765388",
          "CSAFPID-765389",
          "CSAFPID-764778",
          "CSAFPID-816761",
          "CSAFPID-816762",
          "CSAFPID-816763",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-7760",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-7760.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-9493",
            "CSAFPID-220545",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764235",
            "CSAFPID-764236",
            "CSAFPID-764725",
            "CSAFPID-764726",
            "CSAFPID-764727",
            "CSAFPID-764728",
            "CSAFPID-764729",
            "CSAFPID-764730",
            "CSAFPID-765383",
            "CSAFPID-765384",
            "CSAFPID-765385",
            "CSAFPID-765386",
            "CSAFPID-765387",
            "CSAFPID-765388",
            "CSAFPID-765389",
            "CSAFPID-764778",
            "CSAFPID-816761",
            "CSAFPID-816762",
            "CSAFPID-816763",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2020-7760"
    },
    {
      "cve": "CVE-2020-13956",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-220545",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764235",
          "CSAFPID-764236",
          "CSAFPID-764725",
          "CSAFPID-764726",
          "CSAFPID-764727",
          "CSAFPID-764728",
          "CSAFPID-764729",
          "CSAFPID-764730",
          "CSAFPID-228391",
          "CSAFPID-764778",
          "CSAFPID-220546",
          "CSAFPID-9197",
          "CSAFPID-764929",
          "CSAFPID-764930",
          "CSAFPID-765383",
          "CSAFPID-765384",
          "CSAFPID-765385",
          "CSAFPID-765386",
          "CSAFPID-765387",
          "CSAFPID-765388",
          "CSAFPID-765389",
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-1503574",
          "CSAFPID-257324",
          "CSAFPID-135810"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-13956",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13956.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-9493",
            "CSAFPID-220545",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764235",
            "CSAFPID-764236",
            "CSAFPID-764725",
            "CSAFPID-764726",
            "CSAFPID-764727",
            "CSAFPID-764728",
            "CSAFPID-764729",
            "CSAFPID-764730",
            "CSAFPID-228391",
            "CSAFPID-764778",
            "CSAFPID-220546",
            "CSAFPID-9197",
            "CSAFPID-764929",
            "CSAFPID-764930",
            "CSAFPID-765383",
            "CSAFPID-765384",
            "CSAFPID-765385",
            "CSAFPID-765386",
            "CSAFPID-765387",
            "CSAFPID-765388",
            "CSAFPID-765389",
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-1503574",
            "CSAFPID-257324",
            "CSAFPID-135810"
          ]
        }
      ],
      "title": "CVE-2020-13956"
    },
    {
      "cve": "CVE-2020-28975",
      "product_status": {
        "known_affected": [
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-28975",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-28975.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2020-28975"
    },
    {
      "cve": "CVE-2021-23926",
      "cwe": {
        "id": "CWE-776",
        "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
          "title": "CWE-776"
        },
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220545",
          "CSAFPID-220560",
          "CSAFPID-764725",
          "CSAFPID-764726",
          "CSAFPID-764234",
          "CSAFPID-764727",
          "CSAFPID-764728",
          "CSAFPID-764235",
          "CSAFPID-764729",
          "CSAFPID-764730",
          "CSAFPID-764236",
          "CSAFPID-9493",
          "CSAFPID-764778",
          "CSAFPID-228391",
          "CSAFPID-135810",
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-1503574",
          "CSAFPID-220546",
          "CSAFPID-9197",
          "CSAFPID-764929",
          "CSAFPID-764930"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-23926",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23926.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220545",
            "CSAFPID-220560",
            "CSAFPID-764725",
            "CSAFPID-764726",
            "CSAFPID-764234",
            "CSAFPID-764727",
            "CSAFPID-764728",
            "CSAFPID-764235",
            "CSAFPID-764729",
            "CSAFPID-764730",
            "CSAFPID-764236",
            "CSAFPID-9493",
            "CSAFPID-764778",
            "CSAFPID-228391",
            "CSAFPID-135810",
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-1503574",
            "CSAFPID-220546",
            "CSAFPID-9197",
            "CSAFPID-764929",
            "CSAFPID-764930"
          ]
        }
      ],
      "title": "CVE-2021-23926"
    },
    {
      "cve": "CVE-2021-33813",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220545",
          "CSAFPID-220560",
          "CSAFPID-764725",
          "CSAFPID-764726",
          "CSAFPID-764234",
          "CSAFPID-764727",
          "CSAFPID-764728",
          "CSAFPID-764235",
          "CSAFPID-764729",
          "CSAFPID-764730",
          "CSAFPID-764236",
          "CSAFPID-9197",
          "CSAFPID-9493",
          "CSAFPID-228391",
          "CSAFPID-764778",
          "CSAFPID-816761",
          "CSAFPID-816762",
          "CSAFPID-816763",
          "CSAFPID-765383",
          "CSAFPID-765384",
          "CSAFPID-765385",
          "CSAFPID-765386",
          "CSAFPID-765387",
          "CSAFPID-765388",
          "CSAFPID-765389",
          "CSAFPID-135810"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-33813",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-33813.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220545",
            "CSAFPID-220560",
            "CSAFPID-764725",
            "CSAFPID-764726",
            "CSAFPID-764234",
            "CSAFPID-764727",
            "CSAFPID-764728",
            "CSAFPID-764235",
            "CSAFPID-764729",
            "CSAFPID-764730",
            "CSAFPID-764236",
            "CSAFPID-9197",
            "CSAFPID-9493",
            "CSAFPID-228391",
            "CSAFPID-764778",
            "CSAFPID-816761",
            "CSAFPID-816762",
            "CSAFPID-816763",
            "CSAFPID-765383",
            "CSAFPID-765384",
            "CSAFPID-765385",
            "CSAFPID-765386",
            "CSAFPID-765387",
            "CSAFPID-765388",
            "CSAFPID-765389",
            "CSAFPID-135810"
          ]
        }
      ],
      "title": "CVE-2021-33813"
    },
    {
      "cve": "CVE-2022-40150",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220545",
          "CSAFPID-220560",
          "CSAFPID-764725",
          "CSAFPID-764726",
          "CSAFPID-764234",
          "CSAFPID-764727",
          "CSAFPID-764728",
          "CSAFPID-764235",
          "CSAFPID-764729",
          "CSAFPID-764730",
          "CSAFPID-764236",
          "CSAFPID-9493",
          "CSAFPID-764778",
          "CSAFPID-228391",
          "CSAFPID-135810",
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-1503574"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-40150",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40150.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220545",
            "CSAFPID-220560",
            "CSAFPID-764725",
            "CSAFPID-764726",
            "CSAFPID-764234",
            "CSAFPID-764727",
            "CSAFPID-764728",
            "CSAFPID-764235",
            "CSAFPID-764729",
            "CSAFPID-764730",
            "CSAFPID-764236",
            "CSAFPID-9493",
            "CSAFPID-764778",
            "CSAFPID-228391",
            "CSAFPID-135810",
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-1503574"
          ]
        }
      ],
      "title": "CVE-2022-40150"
    },
    {
      "cve": "CVE-2023-2976",
      "cwe": {
        "id": "CWE-552",
        "name": "Files or Directories Accessible to External Parties"
      },
      "notes": [
        {
          "category": "other",
          "text": "Files or Directories Accessible to External Parties",
          "title": "CWE-552"
        },
        {
          "category": "other",
          "text": "Creation of Temporary File in Directory with Insecure Permissions",
          "title": "CWE-379"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-816761",
          "CSAFPID-816762",
          "CSAFPID-816763",
          "CSAFPID-220545",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764235",
          "CSAFPID-764236",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-1503574",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-2976",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-9493",
            "CSAFPID-816761",
            "CSAFPID-816762",
            "CSAFPID-816763",
            "CSAFPID-220545",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764235",
            "CSAFPID-764236",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-1503574",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-2976"
    },
    {
      "cve": "CVE-2023-4785",
      "cwe": {
        "id": "CWE-248",
        "name": "Uncaught Exception"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncaught Exception",
          "title": "CWE-248"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4785",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4785.json"
        }
      ],
      "title": "CVE-2023-4785"
    },
    {
      "cve": "CVE-2023-7272",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-7272",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7272.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-7272"
    },
    {
      "cve": "CVE-2023-24998",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "other",
          "text": "CWE-399",
          "title": "CWE-399"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-220545",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764235",
          "CSAFPID-764236",
          "CSAFPID-764778",
          "CSAFPID-816761",
          "CSAFPID-816762",
          "CSAFPID-816763",
          "CSAFPID-764725",
          "CSAFPID-764726",
          "CSAFPID-764727",
          "CSAFPID-764728",
          "CSAFPID-764729",
          "CSAFPID-764730",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-1503574",
          "CSAFPID-135810"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-24998",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json"
        }
      ],
      "title": "CVE-2023-24998"
    },
    {
      "cve": "CVE-2023-25399",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650736",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-25399",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-25399.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650736",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-25399"
    },
    {
      "cve": "CVE-2023-29824",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650736",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-29824",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29824.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650736",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-29824"
    },
    {
      "cve": "CVE-2023-32732",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Expected Behavior Violation",
          "title": "CWE-440"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32732",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32732.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-32732"
    },
    {
      "cve": "CVE-2023-33202",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650735",
          "CSAFPID-9493",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-1503574",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-33202",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33202.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650735",
            "CSAFPID-9493",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-1503574",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-33202"
    },
    {
      "cve": "CVE-2023-33953",
      "cwe": {
        "id": "CWE-834",
        "name": "Excessive Iteration"
      },
      "notes": [
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "other",
          "text": "Memory Allocation with Excessive Size Value",
          "title": "CWE-789"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-33953",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33953.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-33953"
    },
    {
      "cve": "CVE-2023-43804",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-43804",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43804.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-9493",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-43804"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-220545",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764235",
          "CSAFPID-764236",
          "CSAFPID-816761",
          "CSAFPID-816762",
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-1503574",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-44487",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-9493",
            "CSAFPID-220545",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764235",
            "CSAFPID-764236",
            "CSAFPID-816761",
            "CSAFPID-816762",
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-1503574",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-45803",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-45803",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45803.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-9493",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-45803"
    },
    {
      "cve": "CVE-2023-50782",
      "cwe": {
        "id": "CWE-208",
        "name": "Observable Timing Discrepancy"
      },
      "notes": [
        {
          "category": "other",
          "text": "Observable Timing Discrepancy",
          "title": "CWE-208"
        },
        {
          "category": "other",
          "text": "Observable Discrepancy",
          "title": "CWE-203"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-50782",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50782.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-9493",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2024-0727",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-135810",
          "CSAFPID-1650736",
          "CSAFPID-257324",
          "CSAFPID-9493",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-1503574"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0727",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-135810",
            "CSAFPID-1650736",
            "CSAFPID-257324",
            "CSAFPID-9493",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-1503574"
          ]
        }
      ],
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-1135",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-1135",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-1135"
    },
    {
      "cve": "CVE-2024-4741",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-1503574",
          "CSAFPID-1650736",
          "CSAFPID-257324",
          "CSAFPID-135810"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4741",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
        }
      ],
      "title": "CVE-2024-4741"
    },
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Dependency on Vulnerable Third-Party Component",
          "title": "CWE-1395"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-135810",
          "CSAFPID-1650736",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5535",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-135810",
            "CSAFPID-1650736",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-7254",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220560",
          "CSAFPID-1673195",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7254",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220560",
            "CSAFPID-1673195",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-7254"
    },
    {
      "cve": "CVE-2024-22195",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22195",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-9493",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-26130",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-9493",
          "CSAFPID-220560",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-1503574",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26130",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-9493",
            "CSAFPID-220560",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-1503574",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-26130"
    },
    {
      "cve": "CVE-2024-29025",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-1503574",
          "CSAFPID-220560",
          "CSAFPID-1673195"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29025",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-1503574",
            "CSAFPID-220560",
            "CSAFPID-1673195"
          ]
        }
      ],
      "title": "CVE-2024-29025"
    },
    {
      "cve": "CVE-2024-29131",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-257324",
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-1503574",
          "CSAFPID-1650736"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29131",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-257324",
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-1503574",
            "CSAFPID-1650736"
          ]
        }
      ],
      "title": "CVE-2024-29131"
    },
    {
      "cve": "CVE-2024-34064",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-816763",
          "CSAFPID-1503573",
          "CSAFPID-765385",
          "CSAFPID-764234",
          "CSAFPID-764236",
          "CSAFPID-1503574",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-34064",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-816763",
            "CSAFPID-1503573",
            "CSAFPID-765385",
            "CSAFPID-764234",
            "CSAFPID-764236",
            "CSAFPID-1503574",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-34064"
    },
    {
      "cve": "CVE-2024-35195",
      "cwe": {
        "id": "CWE-670",
        "name": "Always-Incorrect Control Flow Implementation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Always-Incorrect Control Flow Implementation",
          "title": "CWE-670"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-35195",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-35195"
    },
    {
      "cve": "CVE-2024-36114",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650736",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-36114",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36114.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650736",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-36114"
    },
    {
      "cve": "CVE-2024-37891",
      "cwe": {
        "id": "CWE-669",
        "name": "Incorrect Resource Transfer Between Spheres"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Resource Transfer Between Spheres",
          "title": "CWE-669"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38809",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220560",
          "CSAFPID-1673195",
          "CSAFPID-1650736",
          "CSAFPID-257324",
          "CSAFPID-135810"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38809",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-220560",
            "CSAFPID-1673195",
            "CSAFPID-1650736",
            "CSAFPID-257324",
            "CSAFPID-135810"
          ]
        }
      ],
      "title": "CVE-2024-38809"
    },
    {
      "cve": "CVE-2024-38820",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Improper Handling of Case Sensitivity",
          "title": "CWE-178"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220560",
          "CSAFPID-1673195"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38820",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220560",
            "CSAFPID-1673195"
          ]
        }
      ],
      "title": "CVE-2024-38820"
    },
    {
      "cve": "CVE-2024-43382",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        },
        {
          "category": "other",
          "text": "Inadequate Encryption Strength",
          "title": "CWE-326"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220560",
          "CSAFPID-1673195"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-43382",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43382.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220560",
            "CSAFPID-1673195"
          ]
        }
      ],
      "title": "CVE-2024-43382"
    },
    {
      "cve": "CVE-2024-47561",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650736",
          "CSAFPID-257324"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47561",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650736",
            "CSAFPID-257324"
          ]
        }
      ],
      "title": "CVE-2024-47561"
    },
    {
      "cve": "CVE-2025-21532",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751157"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21532",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21532.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751157"
          ]
        }
      ],
      "title": "CVE-2025-21532"
    }
  ]
}
  fkie_cve-2023-50782
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-50782 | Vendor Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2254432 | Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-50782 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2254432 | Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.couchbase.com/alerts/ | 
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | ansible_automation_platform | 2.0 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux | 9.0 | |
| redhat | update_infrastructure | 4 | |
| cryptography.io | cryptography | * | |
| couchbase | couchbase_server | 7.6.0 | |
| couchbase | couchbase_server | 7.6.1 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B4BE2D6-43C3-4065-A213-5DB1325DC78F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:update_infrastructure:4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D92E10-0E79-479F-A963-5657D1BC4E03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cryptography.io:cryptography:*:*:*:*:*:python:*:*",
              "matchCriteriaId": "A7B7EA1D-8C2A-4C40-B9FC-E83F4E87C62B",
              "versionEndExcluding": "42.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:couchbase:couchbase_server:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE39595E-F4B2-4CEC-A405-809B75E71E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:couchbase:couchbase_server:7.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84B0C96-07C4-44ED-A291-94CEAAF6FFB6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 una falla en el paquete python-cryptography. Este problema puede permitir que un atacante remoto descifre mensajes capturados en servidores TLS que utilizan intercambios de claves RSA, lo que puede provocar la exposici\u00f3n de datos confidenciales o sensibles."
    }
  ],
  "id": "CVE-2023-50782",
  "lastModified": "2024-11-21T08:37:18.337",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-05T21:15:11.183",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-50782"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-50782"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.couchbase.com/alerts/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-208"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-203"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  ghsa-3ww4-gg4f-jr7f
Vulnerability from github
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "cryptography"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "42.0.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2023-50782"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-203",
      "CWE-208"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-05T23:04:50Z",
    "nvd_published_at": "2024-02-05T21:15:11Z",
    "severity": "HIGH"
  },
  "details": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
  "id": "GHSA-3ww4-gg4f-jr7f",
  "modified": "2024-09-27T21:34:54Z",
  "published": "2024-02-05T21:30:31Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-50782"
    },
    {
      "type": "WEB",
      "url": "https://github.com/pyca/cryptography/issues/9785"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2023-50782"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254432"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/pyca/cryptography"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "type": "CVSS_V3"
    },
    {
      "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
      "type": "CVSS_V4"
    }
  ],
  "summary": "Python Cryptography package vulnerable to Bleichenbacher timing oracle attack"
}
  opensuse-su-2024:14416-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "libopenssl-3-devel-3.1.4-15.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the libopenssl-3-devel-3.1.4-15.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-14416",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14416-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2024:14416-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZAEWAWTQ662APXDOVFSO6WSPPJ73EELU/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2024:14416-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZAEWAWTQ662APXDOVFSO6WSPPJ73EELU/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-50782 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-50782/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-9143 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-9143/"
      }
    ],
    "title": "libopenssl-3-devel-3.1.4-15.1 on GA media",
    "tracking": {
      "current_release_date": "2024-10-20T00:00:00Z",
      "generator": {
        "date": "2024-10-20T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:14416-1",
      "initial_release_date": "2024-10-20T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-10-20T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.1.4-15.1.aarch64",
                "product": {
                  "name": "libopenssl-3-devel-3.1.4-15.1.aarch64",
                  "product_id": "libopenssl-3-devel-3.1.4-15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-32bit-3.1.4-15.1.aarch64",
                "product": {
                  "name": "libopenssl-3-devel-32bit-3.1.4-15.1.aarch64",
                  "product_id": "libopenssl-3-devel-32bit-3.1.4-15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-3.1.4-15.1.aarch64",
                "product": {
                  "name": "libopenssl-3-fips-provider-3.1.4-15.1.aarch64",
                  "product_id": "libopenssl-3-fips-provider-3.1.4-15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64",
                "product": {
                  "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64",
                  "product_id": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64",
                "product": {
                  "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64",
                  "product_id": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.1.4-15.1.aarch64",
                "product": {
                  "name": "libopenssl3-3.1.4-15.1.aarch64",
                  "product_id": "libopenssl3-3.1.4-15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-32bit-3.1.4-15.1.aarch64",
                "product": {
                  "name": "libopenssl3-32bit-3.1.4-15.1.aarch64",
                  "product_id": "libopenssl3-32bit-3.1.4-15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-x86-64-v3-3.1.4-15.1.aarch64",
                "product": {
                  "name": "libopenssl3-x86-64-v3-3.1.4-15.1.aarch64",
                  "product_id": "libopenssl3-x86-64-v3-3.1.4-15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.1.4-15.1.aarch64",
                "product": {
                  "name": "openssl-3-3.1.4-15.1.aarch64",
                  "product_id": "openssl-3-3.1.4-15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-doc-3.1.4-15.1.aarch64",
                "product": {
                  "name": "openssl-3-doc-3.1.4-15.1.aarch64",
                  "product_id": "openssl-3-doc-3.1.4-15.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "libopenssl-3-devel-3.1.4-15.1.ppc64le",
                  "product_id": "libopenssl-3-devel-3.1.4-15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le",
                  "product_id": "libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "libopenssl-3-fips-provider-3.1.4-15.1.ppc64le",
                  "product_id": "libopenssl-3-fips-provider-3.1.4-15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le",
                  "product_id": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le",
                  "product_id": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "libopenssl3-3.1.4-15.1.ppc64le",
                  "product_id": "libopenssl3-3.1.4-15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-32bit-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "libopenssl3-32bit-3.1.4-15.1.ppc64le",
                  "product_id": "libopenssl3-32bit-3.1.4-15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le",
                  "product_id": "libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "openssl-3-3.1.4-15.1.ppc64le",
                  "product_id": "openssl-3-3.1.4-15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-doc-3.1.4-15.1.ppc64le",
                "product": {
                  "name": "openssl-3-doc-3.1.4-15.1.ppc64le",
                  "product_id": "openssl-3-doc-3.1.4-15.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.1.4-15.1.s390x",
                "product": {
                  "name": "libopenssl-3-devel-3.1.4-15.1.s390x",
                  "product_id": "libopenssl-3-devel-3.1.4-15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-32bit-3.1.4-15.1.s390x",
                "product": {
                  "name": "libopenssl-3-devel-32bit-3.1.4-15.1.s390x",
                  "product_id": "libopenssl-3-devel-32bit-3.1.4-15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-3.1.4-15.1.s390x",
                "product": {
                  "name": "libopenssl-3-fips-provider-3.1.4-15.1.s390x",
                  "product_id": "libopenssl-3-fips-provider-3.1.4-15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x",
                "product": {
                  "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x",
                  "product_id": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x",
                "product": {
                  "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x",
                  "product_id": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.1.4-15.1.s390x",
                "product": {
                  "name": "libopenssl3-3.1.4-15.1.s390x",
                  "product_id": "libopenssl3-3.1.4-15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-32bit-3.1.4-15.1.s390x",
                "product": {
                  "name": "libopenssl3-32bit-3.1.4-15.1.s390x",
                  "product_id": "libopenssl3-32bit-3.1.4-15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-x86-64-v3-3.1.4-15.1.s390x",
                "product": {
                  "name": "libopenssl3-x86-64-v3-3.1.4-15.1.s390x",
                  "product_id": "libopenssl3-x86-64-v3-3.1.4-15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.1.4-15.1.s390x",
                "product": {
                  "name": "openssl-3-3.1.4-15.1.s390x",
                  "product_id": "openssl-3-3.1.4-15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-doc-3.1.4-15.1.s390x",
                "product": {
                  "name": "openssl-3-doc-3.1.4-15.1.s390x",
                  "product_id": "openssl-3-doc-3.1.4-15.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-3.1.4-15.1.x86_64",
                "product": {
                  "name": "libopenssl-3-devel-3.1.4-15.1.x86_64",
                  "product_id": "libopenssl-3-devel-3.1.4-15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-devel-32bit-3.1.4-15.1.x86_64",
                "product": {
                  "name": "libopenssl-3-devel-32bit-3.1.4-15.1.x86_64",
                  "product_id": "libopenssl-3-devel-32bit-3.1.4-15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-3.1.4-15.1.x86_64",
                "product": {
                  "name": "libopenssl-3-fips-provider-3.1.4-15.1.x86_64",
                  "product_id": "libopenssl-3-fips-provider-3.1.4-15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64",
                "product": {
                  "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64",
                  "product_id": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64",
                "product": {
                  "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64",
                  "product_id": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-3.1.4-15.1.x86_64",
                "product": {
                  "name": "libopenssl3-3.1.4-15.1.x86_64",
                  "product_id": "libopenssl3-3.1.4-15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-32bit-3.1.4-15.1.x86_64",
                "product": {
                  "name": "libopenssl3-32bit-3.1.4-15.1.x86_64",
                  "product_id": "libopenssl3-32bit-3.1.4-15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libopenssl3-x86-64-v3-3.1.4-15.1.x86_64",
                "product": {
                  "name": "libopenssl3-x86-64-v3-3.1.4-15.1.x86_64",
                  "product_id": "libopenssl3-x86-64-v3-3.1.4-15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-3.1.4-15.1.x86_64",
                "product": {
                  "name": "openssl-3-3.1.4-15.1.x86_64",
                  "product_id": "openssl-3-3.1.4-15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssl-3-doc-3.1.4-15.1.x86_64",
                "product": {
                  "name": "openssl-3-doc-3.1.4-15.1.x86_64",
                  "product_id": "openssl-3-doc-3.1.4-15.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.aarch64"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.ppc64le"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.s390x"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-32bit-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.aarch64"
        },
        "product_reference": "libopenssl-3-devel-32bit-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le"
        },
        "product_reference": "libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-32bit-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.s390x"
        },
        "product_reference": "libopenssl-3-devel-32bit-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-devel-32bit-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.x86_64"
        },
        "product_reference": "libopenssl-3-devel-32bit-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.aarch64"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.ppc64le"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.s390x"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.x86_64"
        },
        "product_reference": "libopenssl-3-fips-provider-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64"
        },
        "product_reference": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le"
        },
        "product_reference": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x"
        },
        "product_reference": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64"
        },
        "product_reference": "libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64"
        },
        "product_reference": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le"
        },
        "product_reference": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x"
        },
        "product_reference": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64"
        },
        "product_reference": "libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.aarch64"
        },
        "product_reference": "libopenssl3-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.ppc64le"
        },
        "product_reference": "libopenssl3-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.s390x"
        },
        "product_reference": "libopenssl3-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.x86_64"
        },
        "product_reference": "libopenssl3-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-32bit-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.aarch64"
        },
        "product_reference": "libopenssl3-32bit-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-32bit-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.ppc64le"
        },
        "product_reference": "libopenssl3-32bit-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-32bit-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.s390x"
        },
        "product_reference": "libopenssl3-32bit-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-32bit-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.x86_64"
        },
        "product_reference": "libopenssl3-32bit-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-x86-64-v3-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.aarch64"
        },
        "product_reference": "libopenssl3-x86-64-v3-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le"
        },
        "product_reference": "libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-x86-64-v3-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.s390x"
        },
        "product_reference": "libopenssl3-x86-64-v3-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libopenssl3-x86-64-v3-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.x86_64"
        },
        "product_reference": "libopenssl3-x86-64-v3-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.aarch64"
        },
        "product_reference": "openssl-3-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.ppc64le"
        },
        "product_reference": "openssl-3-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.s390x"
        },
        "product_reference": "openssl-3-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.x86_64"
        },
        "product_reference": "openssl-3-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-doc-3.1.4-15.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.aarch64"
        },
        "product_reference": "openssl-3-doc-3.1.4-15.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-doc-3.1.4-15.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.ppc64le"
        },
        "product_reference": "openssl-3-doc-3.1.4-15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-doc-3.1.4-15.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.s390x"
        },
        "product_reference": "openssl-3-doc-3.1.4-15.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-3-doc-3.1.4-15.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.x86_64"
        },
        "product_reference": "openssl-3-doc-3.1.4-15.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-50782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-50782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-50782",
          "url": "https://www.suse.com/security/cve/CVE-2023-50782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218043 for CVE-2023-50782",
          "url": "https://bugzilla.suse.com/1218043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-10-20T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2024-9143",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-9143"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted\nexplicit values for the field polynomial can lead to out-of-bounds memory reads\nor writes.\n\nImpact summary: Out of bound memory writes can lead to an application crash or\neven a possibility of a remote code execution, however, in all the protocols\ninvolving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named\ncurves\" are supported, or, if explicit curve parameters are supported, they\nspecify an X9.62 encoding of binary (GF(2^m)) curves that can\u0027t represent\nproblematic input values. Thus the likelihood of existence of a vulnerable\napplication is low.\n\nIn particular, the X9.62 encoding is used for ECC keys in X.509 certificates,\nso problematic inputs cannot occur in the context of processing X.509\ncertificates.  Any problematic use-cases would have to be using an \"exotic\"\ncurve encoding.\n\nThe affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),\nand various supporting BN_GF2m_*() functions.\n\nApplications working with \"exotic\" explicit binary (GF(2^m)) curve parameters,\nthat make it possible to represent invalid field polynomials with a zero\nconstant term, via the above or similar APIs, may terminate abruptly as a\nresult of reading or writing outside of array bounds.  Remote code execution\ncannot easily be ruled out.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.x86_64",
          "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.aarch64",
          "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.ppc64le",
          "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.s390x",
          "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-9143",
          "url": "https://www.suse.com/security/cve/CVE-2024-9143"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1231741 for CVE-2024-9143",
          "url": "https://bugzilla.suse.com/1231741"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:openssl-3-3.1.4-15.1.x86_64",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.aarch64",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.ppc64le",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.s390x",
            "openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-10-20T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-9143"
    }
  ]
}
  gsd-2023-50782
Vulnerability from gsd
{
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-50782"
      ],
      "details": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.",
      "id": "GSD-2023-50782",
      "modified": "2023-12-14T06:01:33.315446Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2023-50782",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Red Hat Ansible Automation Platform 2",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "unaffected"
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 7",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "unknown"
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        },
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 9",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Satellite 6",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "unaffected"
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Update Infrastructure 4 for Cloud Providers",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Red Hat"
            }
          ]
        }
      },
      "credits": [
        {
          "lang": "en",
          "value": "This issue was discovered by Hubert Kario (Red Hat)."
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data."
          }
        ]
      },
      "impact": {
        "cvss": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-208",
                "lang": "eng",
                "value": "Observable Timing Discrepancy"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://access.redhat.com/security/cve/CVE-2023-50782",
            "refsource": "MISC",
            "url": "https://access.redhat.com/security/cve/CVE-2023-50782"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2254432",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254432"
          }
        ]
      },
      "work_around": [
        {
          "lang": "en",
          "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
        }
      ]
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7B4BE2D6-43C3-4065-A213-5DB1325DC78F",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:redhat:update_infrastructure:4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E8D92E10-0E79-479F-A963-5657D1BC4E03",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:python-cryptography_project:python-cryptography:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3840C0A9-EF24-48AF-B0EE-93E452931D60",
                    "versionEndExcluding": "42.0.0",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data."
          },
          {
            "lang": "es",
            "value": "Se encontr\u00f3 una falla en el paquete python-cryptography. Este problema puede permitir que un atacante remoto descifre mensajes capturados en servidores TLS que utilizan intercambios de claves RSA, lo que puede provocar la exposici\u00f3n de datos confidenciales o sensibles."
          }
        ],
        "id": "CVE-2023-50782",
        "lastModified": "2024-02-26T16:27:48.080",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "NONE",
                "baseScore": 7.5,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "NONE",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 3.6,
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "NONE",
                "baseScore": 7.5,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "NONE",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 3.6,
              "source": "secalert@redhat.com",
              "type": "Secondary"
            }
          ]
        },
        "published": "2024-02-05T21:15:11.183",
        "references": [
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2023-50782"
          },
          {
            "source": "secalert@redhat.com",
            "tags": [
              "Issue Tracking",
              "Vendor Advisory"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254432"
          }
        ],
        "sourceIdentifier": "secalert@redhat.com",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-203"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-208"
              }
            ],
            "source": "secalert@redhat.com",
            "type": "Secondary"
          }
        ]
      }
    }
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.