Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-36140 (GCVE-0-2024-36140)
Vulnerability from cvelistv5
8.2 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
 
| URL | Tags | ||
|---|---|---|---|
{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ozw672",
            "vendor": "siemens",
            "versions": [
              {
                "lessThan": "v5.2",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ozw772",
            "vendor": "siemens",
            "versions": [
              {
                "lessThan": "v5.2",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36140",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-12T14:33:05.874776Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-12T14:35:44.207Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "OZW672",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.2",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "OZW772",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.2",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
            "version": "3.1"
          }
        },
        {
          "cvssV4_0": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-12T12:49:32.130Z",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2024-36140",
    "datePublished": "2024-11-12T12:49:32.130Z",
    "dateReserved": "2024-05-21T11:44:14.682Z",
    "dateUpdated": "2024-11-12T14:35:44.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-36140\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2024-11-12T13:15:07.957\",\"lastModified\":\"2024-11-15T22:53:26.063\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\\r\\n\\r\\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en OZW672 (todas las versiones anteriores a la V5.2) y OZW772 (todas las versiones anteriores a la V5.2). La pesta\u00f1a de cuentas de usuario de los dispositivos afectados es vulnerable a ataques de Cross Site Scripting (XSS) almacenado. Esto podr\u00eda permitir que un atacante remoto autenticado inyecte c\u00f3digo JavaScript arbitrario que luego ejecuta otro usuario v\u00edctima autenticado con posibles privilegios superiores a los del atacante.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"PASSIVE\",\"vulnerableSystemConfidentiality\":\"NONE\",\"vulnerableSystemIntegrity\":\"HIGH\",\"vulnerableSystemAvailability\":\"NONE\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"HIGH\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ozw672_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2\",\"matchCriteriaId\":\"79643F49-38EC-4BC7-9EB4-6586505B6D76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B44996E-361B-4A33-BCBA-E834612D891E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ozw772_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2\",\"matchCriteriaId\":\"C6D46204-8631-4874-98E4-112595A1BDEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D76AA89B-3B42-4A6D-858D-63F503D8F953\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-230445.html\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-36140\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-12T14:33:05.874776Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*\"], \"vendor\": \"siemens\", \"product\": \"ozw672\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v5.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*\"], \"vendor\": \"siemens\", \"product\": \"ozw772\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v5.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-12T14:35:36.264Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N\"}}, {\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.2, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N\"}}], \"affected\": [{\"vendor\": \"Siemens\", \"product\": \"OZW672\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"OZW772\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-230445.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\\r\\n\\r\\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"shortName\": \"siemens\", \"dateUpdated\": \"2024-11-12T12:49:32.130Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-36140\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-12T14:35:44.207Z\", \"dateReserved\": \"2024-05-21T11:44:14.682Z\", \"assignerOrgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"datePublished\": \"2024-11-12T12:49:32.130Z\", \"assignerShortName\": \"siemens\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  icsa-24-319-03
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting this vulnerability to CISA."
      },
      {
        "names": [
          "Paulo Mota"
        ],
        "summary": "reporting this vulnerability to Siemens."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "OZW672 and OZW772 Web Server versions before V5.2 contain a stored cross-site scripting (XSS) vulnerability that could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Multiple",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-230445.json"
      },
      {
        "category": "self",
        "summary": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-24-319-03 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-319-03.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-24-319-03 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-03"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens OZW672 and OZW772 Web Server",
    "tracking": {
      "current_release_date": "2025-05-06T06:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-24-319-03",
      "initial_release_date": "2024-11-12T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2024-11-12T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2025-05-06T06:00:00.000000Z",
          "legacy_version": "Revision",
          "number": "2",
          "summary": "Revision - Fixing typos"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV5.2",
                "product": {
                  "name": "OZW672",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "OZW672"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV5.2",
                "product": {
                  "name": "OZW772",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "OZW772"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-36140",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V5.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        }
      ],
      "title": "CVE-2024-36140"
    }
  ]
}
  ICSA-24-319-03
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting this vulnerability to CISA."
      },
      {
        "names": [
          "Paulo Mota"
        ],
        "summary": "reporting this vulnerability to Siemens."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "OZW672 and OZW772 Web Server versions before V5.2 contain a stored cross-site scripting (XSS) vulnerability that could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Multiple",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-230445.json"
      },
      {
        "category": "self",
        "summary": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-24-319-03 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-319-03.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-24-319-03 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-03"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens OZW672 and OZW772 Web Server",
    "tracking": {
      "current_release_date": "2025-05-06T06:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-24-319-03",
      "initial_release_date": "2024-11-12T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2024-11-12T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2025-05-06T06:00:00.000000Z",
          "legacy_version": "Revision",
          "number": "2",
          "summary": "Revision - Fixing typos"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV5.2",
                "product": {
                  "name": "OZW672",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "OZW672"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV5.2",
                "product": {
                  "name": "OZW772",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "OZW772"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-36140",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V5.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        }
      ],
      "title": "CVE-2024-36140"
    }
  ]
}
  fkie_cve-2024-36140
Vulnerability from fkie_nvd
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| URL | Tags | ||
|---|---|---|---|
| productcert@siemens.com | https://cert-portal.siemens.com/productcert/html/ssa-230445.html | Vendor Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | ozw672_firmware | * | |
| siemens | ozw672 | - | |
| siemens | ozw772_firmware | * | |
| siemens | ozw772 | - | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ozw672_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79643F49-38EC-4BC7-9EB4-6586505B6D76",
              "versionEndExcluding": "5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B44996E-361B-4A33-BCBA-E834612D891E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ozw772_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D46204-8631-4874-98E4-112595A1BDEB",
              "versionEndExcluding": "5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76AA89B-3B42-4A6D-858D-63F503D8F953",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker."
    },
    {
      "lang": "es",
      "value": "Se ha identificado una vulnerabilidad en OZW672 (todas las versiones anteriores a la V5.2) y OZW772 (todas las versiones anteriores a la V5.2). La pesta\u00f1a de cuentas de usuario de los dispositivos afectados es vulnerable a ataques de Cross Site Scripting (XSS) almacenado. Esto podr\u00eda permitir que un atacante remoto autenticado inyecte c\u00f3digo JavaScript arbitrario que luego ejecuta otro usuario v\u00edctima autenticado con posibles privilegios superiores a los del atacante."
    }
  ],
  "id": "CVE-2024-36140",
  "lastModified": "2024-11-15T22:53:26.063",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 4.0,
        "source": "productcert@siemens.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "HIGH",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "NONE",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "productcert@siemens.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-11-12T13:15:07.957",
  "references": [
    {
      "source": "productcert@siemens.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html"
    }
  ],
  "sourceIdentifier": "productcert@siemens.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "productcert@siemens.com",
      "type": "Primary"
    }
  ]
}
  NCSC-2024-0433
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDCOM, SCALANCE, SIMATIC en SINEC.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Cross-Site-Scripting (XSS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Unchecked Input for Loop Condition",
        "title": "CWE-606"
      },
      {
        "category": "general",
        "text": "Use of a Cryptographic Primitive with a Risky Implementation",
        "title": "CWE-1240"
      },
      {
        "category": "general",
        "text": "Misinterpretation of Input",
        "title": "CWE-115"
      },
      {
        "category": "general",
        "text": "Insufficient Technical Documentation",
        "title": "CWE-1059"
      },
      {
        "category": "general",
        "text": "Improperly Controlled Sequential Memory Allocation",
        "title": "CWE-1325"
      },
      {
        "category": "general",
        "text": "Truncation of Security-relevant Information",
        "title": "CWE-222"
      },
      {
        "category": "general",
        "text": "CWE-310",
        "title": "CWE-310"
      },
      {
        "category": "general",
        "text": "Use of Weak Hash",
        "title": "CWE-328"
      },
      {
        "category": "general",
        "text": "Improper Validation of Specified Quantity in Input",
        "title": "CWE-1284"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information Due to Incompatible Policies",
        "title": "CWE-213"
      },
      {
        "category": "general",
        "text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
        "title": "CWE-1268"
      },
      {
        "category": "general",
        "text": "Incorrect Provision of Specified Functionality",
        "title": "CWE-684"
      },
      {
        "category": "general",
        "text": "Missing Release of Resource after Effective Lifetime",
        "title": "CWE-772"
      },
      {
        "category": "general",
        "text": "Observable Timing Discrepancy",
        "title": "CWE-208"
      },
      {
        "category": "general",
        "text": "Insertion of Sensitive Information Into Sent Data",
        "title": "CWE-201"
      },
      {
        "category": "general",
        "text": "Excessive Iteration",
        "title": "CWE-834"
      },
      {
        "category": "general",
        "text": "Incorrect Privilege Assignment",
        "title": "CWE-266"
      },
      {
        "category": "general",
        "text": "Permissive Cross-domain Policy with Untrusted Domains",
        "title": "CWE-942"
      },
      {
        "category": "general",
        "text": "Privilege Dropping / Lowering Errors",
        "title": "CWE-271"
      },
      {
        "category": "general",
        "text": "Incorrect Permission Assignment for Critical Resource",
        "title": "CWE-732"
      },
      {
        "category": "general",
        "text": "Improper Locking",
        "title": "CWE-667"
      },
      {
        "category": "general",
        "text": "Expected Behavior Violation",
        "title": "CWE-440"
      },
      {
        "category": "general",
        "text": "Improper Validation of Certificate with Host Mismatch",
        "title": "CWE-297"
      },
      {
        "category": "general",
        "text": "Missing Encryption of Sensitive Data",
        "title": "CWE-311"
      },
      {
        "category": "general",
        "text": "Improper Check for Unusual or Exceptional Conditions",
        "title": "CWE-754"
      },
      {
        "category": "general",
        "text": "Reachable Assertion",
        "title": "CWE-617"
      },
      {
        "category": "general",
        "text": "Uncontrolled Search Path Element",
        "title": "CWE-427"
      },
      {
        "category": "general",
        "text": "Cleartext Transmission of Sensitive Information",
        "title": "CWE-319"
      },
      {
        "category": "general",
        "text": "Insufficient Session Expiration",
        "title": "CWE-613"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "Observable Discrepancy",
        "title": "CWE-203"
      },
      {
        "category": "general",
        "text": "Improper Validation of Integrity Check Value",
        "title": "CWE-354"
      },
      {
        "category": "general",
        "text": "Missing Cryptographic Step",
        "title": "CWE-325"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Use of Hard-coded Cryptographic Key",
        "title": "CWE-321"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "CWE-275",
        "title": "CWE-275"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Inefficient Regular Expression Complexity",
        "title": "CWE-1333"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
        "title": "CWE-113"
      },
      {
        "category": "general",
        "text": "Missing Release of Memory after Effective Lifetime",
        "title": "CWE-401"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Improper Certificate Validation",
        "title": "CWE-295"
      },
      {
        "category": "general",
        "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
        "title": "CWE-757"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Use of a Broken or Risky Cryptographic Algorithm",
        "title": "CWE-327"
      },
      {
        "category": "general",
        "text": "Interpretation Conflict",
        "title": "CWE-436"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
        "title": "CWE-74"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Server-Side Request Forgery (SSRF)",
        "title": "CWE-918"
      },
      {
        "category": "general",
        "text": "Incorrect Authorization",
        "title": "CWE-863"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Memory Allocation with Excessive Size Value",
        "title": "CWE-789"
      },
      {
        "category": "general",
        "text": "Improper Privilege Management",
        "title": "CWE-269"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Improper Authentication",
        "title": "CWE-287"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
        "title": "CWE-79"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-000297.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064257.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-230445.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-331112.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-351178.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-354112.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-454789.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616032.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-654798.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-871035.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-914892.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-915275.pdf"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Siemens producten",
    "tracking": {
      "current_release_date": "2024-11-12T14:19:20.051128Z",
      "id": "NCSC-2024-0433",
      "initial_release_date": "2024-11-12T14:19:20.051128Z",
      "revision_history": [
        {
          "date": "2024-11-12T14:19:20.051128Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "mendix_runtime_v10.12",
            "product": {
              "name": "mendix_runtime_v10.12",
              "product_id": "CSAFPID-1637623",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.12:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mendix_runtime_v10.6",
            "product": {
              "name": "mendix_runtime_v10.6",
              "product_id": "CSAFPID-1637624",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.6:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mendix_runtime_v10",
            "product": {
              "name": "mendix_runtime_v10",
              "product_id": "CSAFPID-1637622",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v10:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mendix_runtime_v8",
            "product": {
              "name": "mendix_runtime_v8",
              "product_id": "CSAFPID-1637625",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v8:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mendix_runtime_v9",
            "product": {
              "name": "mendix_runtime_v9",
              "product_id": "CSAFPID-1637626",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v9:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ozw672",
            "product": {
              "name": "ozw672",
              "product_id": "CSAFPID-1712832",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ozw672:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ozw772",
            "product": {
              "name": "ozw772",
              "product_id": "CSAFPID-1712833",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ozw772:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
              "product_id": "CSAFPID-1712834",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_1000_to_5000_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
              "product_id": "CSAFPID-1712835",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_256_to_1000_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_32_to_64_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_32_to_64_v3.1",
              "product_id": "CSAFPID-1712836",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_32_to_64_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_64_to_256_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_64_to_256_v3.1",
              "product_id": "CSAFPID-1712837",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_64_to_256_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_8_to_32_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_8_to_32_v3.1",
              "product_id": "CSAFPID-1712838",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_8_to_32_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_ape1808",
            "product": {
              "name": "ruggedcom_ape1808",
              "product_id": "CSAFPID-1615259",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_rm1224_lte_4g__eu",
            "product": {
              "name": "ruggedcom_rm1224_lte_4g__eu",
              "product_id": "CSAFPID-1702670",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_rm1224_lte_4g__nam",
            "product": {
              "name": "ruggedcom_rm1224_lte_4g__nam",
              "product_id": "CSAFPID-1702671",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "s7-pct",
            "product": {
              "name": "s7-pct",
              "product_id": "CSAFPID-1637909",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:s7-pct:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "s7-pct",
            "product": {
              "name": "s7-pct",
              "product_id": "CSAFPID-1470060",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:s7-pct:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "s7_port_configuration_tool",
            "product": {
              "name": "s7_port_configuration_tool",
              "product_id": "CSAFPID-1472074",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:s7_port_configuration_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m804pb",
            "product": {
              "name": "scalance_m804pb",
              "product_id": "CSAFPID-1702672",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m804pb:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m812-1_adsl-router",
            "product": {
              "name": "scalance_m812-1_adsl-router",
              "product_id": "CSAFPID-1712749",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m816-1_adsl-router",
            "product": {
              "name": "scalance_m816-1_adsl-router",
              "product_id": "CSAFPID-1712750",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m826-2_shdsl-router",
            "product": {
              "name": "scalance_m826-2_shdsl-router",
              "product_id": "CSAFPID-1702677",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m874-2",
            "product": {
              "name": "scalance_m874-2",
              "product_id": "CSAFPID-1702678",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m874-2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m874-3",
            "product": {
              "name": "scalance_m874-3",
              "product_id": "CSAFPID-1702679",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m874-3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m874-3_3g-router__cn_",
            "product": {
              "name": "scalance_m874-3_3g-router__cn_",
              "product_id": "CSAFPID-1712751",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m874-3_3g-router__cn_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-3",
            "product": {
              "name": "scalance_m876-3",
              "product_id": "CSAFPID-1712752",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-3__rok_",
            "product": {
              "name": "scalance_m876-3__rok_",
              "product_id": "CSAFPID-1702681",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-4",
            "product": {
              "name": "scalance_m876-4",
              "product_id": "CSAFPID-1712753",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-4__eu_",
            "product": {
              "name": "scalance_m876-4__eu_",
              "product_id": "CSAFPID-1702682",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-4__nam_",
            "product": {
              "name": "scalance_m876-4__nam_",
              "product_id": "CSAFPID-1702683",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum853-1__a1_",
            "product": {
              "name": "scalance_mum853-1__a1_",
              "product_id": "CSAFPID-1712754",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum853-1__a1_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum853-1__b1_",
            "product": {
              "name": "scalance_mum853-1__b1_",
              "product_id": "CSAFPID-1712755",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum853-1__b1_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum853-1__eu_",
            "product": {
              "name": "scalance_mum853-1__eu_",
              "product_id": "CSAFPID-1712756",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__a1_",
            "product": {
              "name": "scalance_mum856-1__a1_",
              "product_id": "CSAFPID-1712757",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__a1_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__b1_",
            "product": {
              "name": "scalance_mum856-1__b1_",
              "product_id": "CSAFPID-1712758",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__b1_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__cn_",
            "product": {
              "name": "scalance_mum856-1__cn_",
              "product_id": "CSAFPID-1712759",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__cn_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__eu_",
            "product": {
              "name": "scalance_mum856-1__eu_",
              "product_id": "CSAFPID-1702684",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__row_",
            "product": {
              "name": "scalance_mum856-1__row_",
              "product_id": "CSAFPID-1702685",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_s615_eec_lan-router",
            "product": {
              "name": "scalance_s615_eec_lan-router",
              "product_id": "CSAFPID-1712760",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_s615_eec_lan-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_s615_lan-router",
            "product": {
              "name": "scalance_s615_lan-router",
              "product_id": "CSAFPID-1712761",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_s615_lan-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xch328__6gk5328-4ts01-2ec2_",
            "product": {
              "name": "scalance_xch328__6gk5328-4ts01-2ec2_",
              "product_id": "CSAFPID-1613504",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xch328__6gk5328-4ts01-2ec2_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
            "product": {
              "name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
              "product_id": "CSAFPID-1613505",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xcm324__6gk5324-8ts01-2ac2_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
            "product": {
              "name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
              "product_id": "CSAFPID-1613506",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xcm328__6gk5328-4ts01-2ac2_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
            "product": {
              "name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
              "product_id": "CSAFPID-1613507",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xcm332__6gk5332-0ga01-2ac2_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
            "product": {
              "name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
              "product_id": "CSAFPID-1613592",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
            "product": {
              "name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
              "product_id": "CSAFPID-1613593",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
            "product": {
              "name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
              "product_id": "CSAFPID-1613594",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
            "product": {
              "name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
              "product_id": "CSAFPID-1613595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
            "product": {
              "name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
              "product_id": "CSAFPID-1613596",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
            "product": {
              "name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
              "product_id": "CSAFPID-1613597",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
            "product": {
              "name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
              "product_id": "CSAFPID-1613598",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "security_configuration_tool",
            "product": {
              "name": "security_configuration_tool",
              "product_id": "CSAFPID-1625339",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "security_configuration_tool__sct_",
            "product": {
              "name": "security_configuration_tool__sct_",
              "product_id": "CSAFPID-1637910",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "security_configuration_tool__sct_",
            "product": {
              "name": "security_configuration_tool__sct_",
              "product_id": "CSAFPID-1470061",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_automation_tool",
            "product": {
              "name": "simatic_automation_tool",
              "product_id": "CSAFPID-1472069",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_automation_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_automation_tool",
            "product": {
              "name": "simatic_automation_tool",
              "product_id": "CSAFPID-1637559",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_automation_tool:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_automation_tool",
            "product": {
              "name": "simatic_automation_tool",
              "product_id": "CSAFPID-1470062",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_automation_tool:all_versions:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_batch_v9.1",
            "product": {
              "name": "simatic_batch_v9.1",
              "product_id": "CSAFPID-1625340",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_batch_v9.1",
            "product": {
              "name": "simatic_batch_v9.1",
              "product_id": "CSAFPID-1470063",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_cp_1543-1_v4.0",
            "product": {
              "name": "simatic_cp_1543-1_v4.0",
              "product_id": "CSAFPID-1712748",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_cp_1543-1_v4.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_mv500_family",
            "product": {
              "name": "simatic_mv500_family",
              "product_id": "CSAFPID-1703073",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_mv500_family:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc-software",
            "product": {
              "name": "simatic_net_pc-software",
              "product_id": "CSAFPID-1625344",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc-software:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software",
            "product": {
              "name": "simatic_net_pc_software",
              "product_id": "CSAFPID-1470064",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v16",
            "product": {
              "name": "simatic_net_pc_software_v16",
              "product_id": "CSAFPID-1637849",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v16",
            "product": {
              "name": "simatic_net_pc_software_v16",
              "product_id": "CSAFPID-1457906",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v17",
            "product": {
              "name": "simatic_net_pc_software_v17",
              "product_id": "CSAFPID-1637850",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v17",
            "product": {
              "name": "simatic_net_pc_software_v17",
              "product_id": "CSAFPID-1457907",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v18",
            "product": {
              "name": "simatic_net_pc_software_v18",
              "product_id": "CSAFPID-1637851",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v18",
            "product": {
              "name": "simatic_net_pc_software_v18",
              "product_id": "CSAFPID-1457908",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v19",
            "product": {
              "name": "simatic_net_pc_software_v19",
              "product_id": "CSAFPID-1637911",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v19",
            "product": {
              "name": "simatic_net_pc_software_v19",
              "product_id": "CSAFPID-1637560",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pcs",
            "product": {
              "name": "simatic_pcs",
              "product_id": "CSAFPID-838530",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pcs:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pcs_7_v9.1",
            "product": {
              "name": "simatic_pcs_7_v9.1",
              "product_id": "CSAFPID-1501190",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pcs_7_v9.1",
            "product": {
              "name": "simatic_pcs_7_v9.1",
              "product_id": "CSAFPID-1457909",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pdm_v9.2",
            "product": {
              "name": "simatic_pdm_v9.2",
              "product_id": "CSAFPID-1637912",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pdm_v9.2",
            "product": {
              "name": "simatic_pdm_v9.2",
              "product_id": "CSAFPID-1470065",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_route_control_",
            "product": {
              "name": "simatic_route_control_",
              "product_id": "CSAFPID-1625337",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_route_control_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_route_control_v9.1",
            "product": {
              "name": "simatic_route_control_v9.1",
              "product_id": "CSAFPID-1637856",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_route_control_v9.1",
            "product": {
              "name": "simatic_route_control_v9.1",
              "product_id": "CSAFPID-1470066",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager",
            "product": {
              "name": "simatic_rtls_locating_manager",
              "product_id": "CSAFPID-1691398",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager:3.0.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-0da00_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-0da00_",
              "product_id": "CSAFPID-1703180",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da00_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-0da10_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-0da10_",
              "product_id": "CSAFPID-1703181",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da10_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-0da20_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-0da20_",
              "product_id": "CSAFPID-1703182",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da20_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-0da30_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-0da30_",
              "product_id": "CSAFPID-1703183",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da30_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
              "product_id": "CSAFPID-1703184",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea10_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
              "product_id": "CSAFPID-1703185",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea20_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
              "product_id": "CSAFPID-1703186",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea30_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
            "product": {
              "name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
              "product_id": "CSAFPID-1615260",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
            "product": {
              "name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
              "product_id": "CSAFPID-1615261",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
            "product": {
              "name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
              "product_id": "CSAFPID-1615262",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
            "product": {
              "name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
              "product_id": "CSAFPID-1615263",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
            "product": {
              "name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
              "product_id": "CSAFPID-1703131",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-plcsim_v16",
            "product": {
              "name": "simatic_s7-plcsim_v16",
              "product_id": "CSAFPID-1712825",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-plcsim_v17",
            "product": {
              "name": "simatic_s7-plcsim_v17",
              "product_id": "CSAFPID-1712826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_safety_v16",
            "product": {
              "name": "simatic_step_7_safety_v16",
              "product_id": "CSAFPID-1703190",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_safety_v17",
            "product": {
              "name": "simatic_step_7_safety_v17",
              "product_id": "CSAFPID-1703191",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_safety_v18",
            "product": {
              "name": "simatic_step_7_safety_v18",
              "product_id": "CSAFPID-1500667",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v16",
            "product": {
              "name": "simatic_step_7_v16",
              "product_id": "CSAFPID-1703187",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v17",
            "product": {
              "name": "simatic_step_7_v17",
              "product_id": "CSAFPID-1703188",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v18",
            "product": {
              "name": "simatic_step_7_v18",
              "product_id": "CSAFPID-1703189",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v5",
            "product": {
              "name": "simatic_step_7_v5",
              "product_id": "CSAFPID-1637913",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v5",
            "product": {
              "name": "simatic_step_7_v5",
              "product_id": "CSAFPID-1457855",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-75563",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-1550826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc:8.0:update_5:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.17",
            "product": {
              "name": "simatic_wincc_oa_v3.17",
              "product_id": "CSAFPID-1637914",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.17",
            "product": {
              "name": "simatic_wincc_oa_v3.17",
              "product_id": "CSAFPID-1457956",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.18",
            "product": {
              "name": "simatic_wincc_oa_v3.18",
              "product_id": "CSAFPID-1637915",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.18",
            "product": {
              "name": "simatic_wincc_oa_v3.18",
              "product_id": "CSAFPID-1457957",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.19",
            "product": {
              "name": "simatic_wincc_oa_v3.19",
              "product_id": "CSAFPID-1637916",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.19",
            "product": {
              "name": "simatic_wincc_oa_v3.19",
              "product_id": "CSAFPID-1457958",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_advanced",
            "product": {
              "name": "simatic_wincc_runtime_advanced",
              "product_id": "CSAFPID-766087",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_advanced",
            "product": {
              "name": "simatic_wincc_runtime_advanced",
              "product_id": "CSAFPID-1470067",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-165765",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v16",
            "product": {
              "name": "simatic_wincc_runtime_professional_v16",
              "product_id": "CSAFPID-1637917",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v16",
            "product": {
              "name": "simatic_wincc_runtime_professional_v16",
              "product_id": "CSAFPID-1457960",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v17",
            "product": {
              "name": "simatic_wincc_runtime_professional_v17",
              "product_id": "CSAFPID-1637887",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v17",
            "product": {
              "name": "simatic_wincc_runtime_professional_v17",
              "product_id": "CSAFPID-1457961",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v18",
            "product": {
              "name": "simatic_wincc_runtime_professional_v18",
              "product_id": "CSAFPID-1501188",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v18",
            "product": {
              "name": "simatic_wincc_runtime_professional_v18",
              "product_id": "CSAFPID-1457962",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v19",
            "product": {
              "name": "simatic_wincc_runtime_professional_v19",
              "product_id": "CSAFPID-1501192",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v19",
            "product": {
              "name": "simatic_wincc_runtime_professional_v19",
              "product_id": "CSAFPID-1457963",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_pc_runtime",
            "product": {
              "name": "simatic_wincc_unified_pc_runtime",
              "product_id": "CSAFPID-744621",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_pc_runtime",
            "product": {
              "name": "simatic_wincc_unified_pc_runtime",
              "product_id": "CSAFPID-1470068",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_pc_runtime_v18",
            "product": {
              "name": "simatic_wincc_unified_pc_runtime_v18",
              "product_id": "CSAFPID-1637854",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_pc_runtime_v18",
            "product": {
              "name": "simatic_wincc_unified_pc_runtime_v18",
              "product_id": "CSAFPID-1637561",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_v16",
            "product": {
              "name": "simatic_wincc_unified_v16",
              "product_id": "CSAFPID-1703192",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_v17",
            "product": {
              "name": "simatic_wincc_unified_v17",
              "product_id": "CSAFPID-1703193",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_v18",
            "product": {
              "name": "simatic_wincc_unified_v18",
              "product_id": "CSAFPID-1703194",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v16",
            "product": {
              "name": "simatic_wincc_v16",
              "product_id": "CSAFPID-1702687",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v17",
            "product": {
              "name": "simatic_wincc_v17",
              "product_id": "CSAFPID-1702688",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v18",
            "product": {
              "name": "simatic_wincc_v18",
              "product_id": "CSAFPID-1703195",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v7.4",
            "product": {
              "name": "simatic_wincc_v7.4",
              "product_id": "CSAFPID-1501193",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v7.4",
            "product": {
              "name": "simatic_wincc_v7.4",
              "product_id": "CSAFPID-1457965",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v7.5",
            "product": {
              "name": "simatic_wincc_v7.5",
              "product_id": "CSAFPID-1501191",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v7.5",
            "product": {
              "name": "simatic_wincc_v7.5",
              "product_id": "CSAFPID-1457966",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v8.0",
            "product": {
              "name": "simatic_wincc_v8.0",
              "product_id": "CSAFPID-1501189",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v8.0",
            "product": {
              "name": "simatic_wincc_v8.0",
              "product_id": "CSAFPID-1457967",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simocode_es_v16",
            "product": {
              "name": "simocode_es_v16",
              "product_id": "CSAFPID-1702694",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simocode_es_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simocode_es_v17",
            "product": {
              "name": "simocode_es_v17",
              "product_id": "CSAFPID-1703196",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simocode_es_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simocode_es_v18",
            "product": {
              "name": "simocode_es_v18",
              "product_id": "CSAFPID-1703197",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simocode_es_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simotion_scout_tia_v5.4_sp1",
            "product": {
              "name": "simotion_scout_tia_v5.4_sp1",
              "product_id": "CSAFPID-1703198",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simotion_scout_tia_v5.4_sp3",
            "product": {
              "name": "simotion_scout_tia_v5.4_sp3",
              "product_id": "CSAFPID-1703199",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simotion_scout_tia_v5.5_sp1",
            "product": {
              "name": "simotion_scout_tia_v5.5_sp1",
              "product_id": "CSAFPID-1703200",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.5_sp1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive",
            "product": {
              "name": "sinamics_startdrive",
              "product_id": "CSAFPID-1625341",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive",
            "product": {
              "name": "sinamics_startdrive",
              "product_id": "CSAFPID-1470069",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive_v16",
            "product": {
              "name": "sinamics_startdrive_v16",
              "product_id": "CSAFPID-1703201",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive_v17",
            "product": {
              "name": "sinamics_startdrive_v17",
              "product_id": "CSAFPID-1703202",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive_v18",
            "product": {
              "name": "sinamics_startdrive_v18",
              "product_id": "CSAFPID-1703203",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_ins",
            "product": {
              "name": "sinec_ins",
              "product_id": "CSAFPID-746925",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_network_management_system",
            "product": {
              "name": "sinec_network_management_system",
              "product_id": "CSAFPID-1691397",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_network_management_system:2.0:sp1:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_nms",
            "product": {
              "name": "sinec_nms",
              "product_id": "CSAFPID-309392",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_nms",
            "product": {
              "name": "sinec_nms",
              "product_id": "CSAFPID-1458012",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_nms:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_nms",
            "product": {
              "name": "sinec_nms",
              "product_id": "CSAFPID-1693062",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_nms:2.0:sp2:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_nms",
            "product": {
              "name": "sinec_nms",
              "product_id": "CSAFPID-1691473",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_nms:3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinema_remote_connect_client",
            "product": {
              "name": "sinema_remote_connect_client",
              "product_id": "CSAFPID-894438",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinumerik_one_virtual",
            "product": {
              "name": "sinumerik_one_virtual",
              "product_id": "CSAFPID-1625342",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinumerik_one_virtual",
            "product": {
              "name": "sinumerik_one_virtual",
              "product_id": "CSAFPID-1470070",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinumerik_plc_programming_tool",
            "product": {
              "name": "sinumerik_plc_programming_tool",
              "product_id": "CSAFPID-1625338",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinumerik_plc_programming_tool",
            "product": {
              "name": "sinumerik_plc_programming_tool",
              "product_id": "CSAFPID-1470071",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
            "product": {
              "name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
              "product_id": "CSAFPID-1615264",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siport",
            "product": {
              "name": "siport",
              "product_id": "CSAFPID-1712847",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:siport:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sirius_safety_es_v17",
            "product": {
              "name": "sirius_safety_es_v17",
              "product_id": "CSAFPID-1703204",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sirius_safety_es_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sirius_safety_es_v18",
            "product": {
              "name": "sirius_safety_es_v18",
              "product_id": "CSAFPID-1703205",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sirius_safety_es_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sirius_soft_starter_es_v17",
            "product": {
              "name": "sirius_soft_starter_es_v17",
              "product_id": "CSAFPID-1703206",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sirius_soft_starter_es_v18",
            "product": {
              "name": "sirius_soft_starter_es_v18",
              "product_id": "CSAFPID-1703207",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "solid_edge_se2024",
            "product": {
              "name": "solid_edge_se2024",
              "product_id": "CSAFPID-1680248",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "spectrum_power_7",
            "product": {
              "name": "spectrum_power_7",
              "product_id": "CSAFPID-524281",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "st7_scadaconnect",
            "product": {
              "name": "st7_scadaconnect",
              "product_id": "CSAFPID-1691077",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:st7_scadaconnect:1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
            "product": {
              "name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
              "product_id": "CSAFPID-1703173",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:st7_scadaconnect__6nh7997-5da10-0aa0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic",
            "product": {
              "name": "telecontrol_server_basic",
              "product_id": "CSAFPID-1691051",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic:3.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_1000_v3.1",
            "product": {
              "name": "telecontrol_server_basic_1000_v3.1",
              "product_id": "CSAFPID-1712839",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_1000_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_256_v3.1",
            "product": {
              "name": "telecontrol_server_basic_256_v3.1",
              "product_id": "CSAFPID-1712840",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_256_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_32_v3.1",
            "product": {
              "name": "telecontrol_server_basic_32_v3.1",
              "product_id": "CSAFPID-1712841",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_32_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_5000_v3.1",
            "product": {
              "name": "telecontrol_server_basic_5000_v3.1",
              "product_id": "CSAFPID-1712842",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_5000_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_64_v3.1",
            "product": {
              "name": "telecontrol_server_basic_64_v3.1",
              "product_id": "CSAFPID-1712843",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_64_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_8_v3.1",
            "product": {
              "name": "telecontrol_server_basic_8_v3.1",
              "product_id": "CSAFPID-1712844",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_8_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_serv_upgr",
            "product": {
              "name": "telecontrol_server_basic_serv_upgr",
              "product_id": "CSAFPID-1712845",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_serv_upgr:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_upgr_v3.1",
            "product": {
              "name": "telecontrol_server_basic_upgr_v3.1",
              "product_id": "CSAFPID-1712846",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_upgr_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_v3",
            "product": {
              "name": "telecontrol_server_basic_v3",
              "product_id": "CSAFPID-1637855",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_v3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_connector",
            "product": {
              "name": "tia_portal_cloud_connector",
              "product_id": "CSAFPID-1625345",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_connector",
            "product": {
              "name": "tia_portal_cloud_connector",
              "product_id": "CSAFPID-1470072",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_v16",
            "product": {
              "name": "tia_portal_cloud_v16",
              "product_id": "CSAFPID-1712827",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_v17",
            "product": {
              "name": "tia_portal_cloud_v17",
              "product_id": "CSAFPID-1712828",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_v18",
            "product": {
              "name": "tia_portal_cloud_v18",
              "product_id": "CSAFPID-1712829",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-74798",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:15.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-75533",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:16:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-74794",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:17:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-74792",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-1472073",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:19:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v15.1",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v15.1",
              "product_id": "CSAFPID-1615531",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v15.1",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v15.1",
              "product_id": "CSAFPID-1458014",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v16",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v16",
              "product_id": "CSAFPID-1615256",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v16",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v16",
              "product_id": "CSAFPID-1458015",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v17",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v17",
              "product_id": "CSAFPID-1615257",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v17",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v17",
              "product_id": "CSAFPID-1458016",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v18",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v18",
              "product_id": "CSAFPID-1615258",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v18",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v18",
              "product_id": "CSAFPID-1458017",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v19",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v19",
              "product_id": "CSAFPID-1637618",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v19",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v19",
              "product_id": "CSAFPID-1470073",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "wincc",
            "product": {
              "name": "wincc",
              "product_id": "CSAFPID-1625343",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "wincc_tia_portal",
            "product": {
              "name": "wincc_tia_portal",
              "product_id": "CSAFPID-465667",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:wincc_tia_portal:11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500",
            "product": {
              "name": "simatic_s7-1500",
              "product_id": "CSAFPID-715650",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7",
            "product": {
              "name": "simatic_s7",
              "product_id": "CSAFPID-1613729",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:siemens:simatic_s7:1500:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
            "product": {
              "name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
              "product_id": "CSAFPID-1691401",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn\\/dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "cpu_1518f-4_pn__dp_mfp_firmware",
            "product": {
              "name": "cpu_1518f-4_pn__dp_mfp_firmware",
              "product_id": "CSAFPID-715649",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn__dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_ape1808",
            "product": {
              "name": "ruggedcom_ape1808",
              "product_id": "CSAFPID-880853",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_ape1808_firmware",
            "product": {
              "name": "ruggedcom_ape1808_firmware",
              "product_id": "CSAFPID-542833",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "security_configuration_tool",
            "product": {
              "name": "security_configuration_tool",
              "product_id": "CSAFPID-540747",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siemens_simatic_s7-1500_tm_mfp",
            "product": {
              "name": "siemens_simatic_s7-1500_tm_mfp",
              "product_id": "CSAFPID-1693048",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:siemens_simatic_s7-1500_tm_mfp:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siemens_simatic_s7_-1500_tm_mfp",
            "product": {
              "name": "siemens_simatic_s7_-1500_tm_mfp",
              "product_id": "CSAFPID-907212",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:siemens_simatic_s7_-1500_tm_mfp:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siemens_telecontrol_server_basic",
            "product": {
              "name": "siemens_telecontrol_server_basic",
              "product_id": "CSAFPID-907211",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:siemens_telecontrol_server_basic:3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_mv500_firmware",
            "product": {
              "name": "simatic_mv500_firmware",
              "product_id": "CSAFPID-1692274",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_mv500_firmware:3.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software",
            "product": {
              "name": "simatic_net_pc_software",
              "product_id": "CSAFPID-1472070",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_net_pc_software:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pcs_7",
            "product": {
              "name": "simatic_pcs_7",
              "product_id": "CSAFPID-1472067",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_pcs_7:9.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
            "product": {
              "name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
              "product_id": "CSAFPID-1689769",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
            "product": {
              "name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
              "product_id": "CSAFPID-766929",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_tm_mfp_firmware",
            "product": {
              "name": "simatic_s7-1500_tm_mfp_firmware",
              "product_id": "CSAFPID-717239",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_tm_mfp_firmware",
            "product": {
              "name": "simatic_s7-1500_tm_mfp_firmware",
              "product_id": "CSAFPID-905869",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7",
            "product": {
              "name": "simatic_step_7",
              "product_id": "CSAFPID-879652",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_step_7:5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-1472068",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-1472066",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-1472072",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc:8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa",
            "product": {
              "name": "simatic_wincc_oa",
              "product_id": "CSAFPID-1472071",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_oa:3.17:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_advanced",
            "product": {
              "name": "simatic_wincc_runtime_advanced",
              "product_id": "CSAFPID-886176",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-165976",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:16:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-165974",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:17:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-855582",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:18:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-855580",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:19:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-3506",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-3506",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3506.json"
        }
      ],
      "title": "CVE-2021-3506"
    },
    {
      "cve": "CVE-2023-2975",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Authentication",
          "title": "CWE-287"
        },
        {
          "category": "other",
          "text": "Improper Validation of Integrity Check Value",
          "title": "CWE-354"
        },
        {
          "category": "other",
          "text": "Use of a Broken or Risky Cryptographic Algorithm",
          "title": "CWE-327"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1703073",
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-2975",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2975.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1703073",
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-3341",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3341",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3341.json"
        }
      ],
      "title": "CVE-2023-3341"
    },
    {
      "cve": "CVE-2023-3446",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        },
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        },
        {
          "category": "other",
          "text": "Use of a Cryptographic Primitive with a Risky Implementation",
          "title": "CWE-1240"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703073",
          "CSAFPID-309392",
          "CSAFPID-1637855",
          "CSAFPID-1703131",
          "CSAFPID-1703173"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3446",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703073",
            "CSAFPID-309392",
            "CSAFPID-1637855",
            "CSAFPID-1703131",
            "CSAFPID-1703173"
          ]
        }
      ],
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-3817",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        },
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        },
        {
          "category": "other",
          "text": "Use of a Cryptographic Primitive with a Risky Implementation",
          "title": "CWE-1240"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1613729",
          "CSAFPID-1703073",
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3817",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1613729",
            "CSAFPID-1703073",
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4236",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4236",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4236.json"
        }
      ],
      "title": "CVE-2023-4236"
    },
    {
      "cve": "CVE-2023-4408",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4408",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
        }
      ],
      "title": "CVE-2023-4408"
    },
    {
      "cve": "CVE-2023-4807",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Expected Behavior Violation",
          "title": "CWE-440"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1637855",
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4807",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4807.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1637855",
            "CSAFPID-1703180",
            "CSAFPID-1703181",
            "CSAFPID-1703182",
            "CSAFPID-1703183",
            "CSAFPID-1703184",
            "CSAFPID-1703185",
            "CSAFPID-1703186"
          ]
        }
      ],
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-5363",
      "cwe": {
        "id": "CWE-325",
        "name": "Missing Cryptographic Step"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Cryptographic Step",
          "title": "CWE-325"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Incorrect Provision of Specified Functionality",
          "title": "CWE-684"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5363",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5363.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1703180",
            "CSAFPID-1703181",
            "CSAFPID-1703182",
            "CSAFPID-1703183",
            "CSAFPID-1703184",
            "CSAFPID-1703185",
            "CSAFPID-1703186"
          ]
        }
      ],
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2023-5517",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5517",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5517.json"
        }
      ],
      "title": "CVE-2023-5517"
    },
    {
      "cve": "CVE-2023-5678",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        },
        {
          "category": "other",
          "text": "Missing Cryptographic Step",
          "title": "CWE-325"
        },
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1613729",
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1637855",
          "CSAFPID-1703131",
          "CSAFPID-309392",
          "CSAFPID-1703173",
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5678",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
        }
      ],
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5679",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5679",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5679.json"
        }
      ],
      "title": "CVE-2023-5679"
    },
    {
      "cve": "CVE-2023-5680",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5680",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5680.json"
        }
      ],
      "title": "CVE-2023-5680"
    },
    {
      "cve": "CVE-2023-6129",
      "cwe": {
        "id": "CWE-328",
        "name": "Use of Weak Hash"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Weak Hash",
          "title": "CWE-328"
        },
        {
          "category": "other",
          "text": "Expected Behavior Violation",
          "title": "CWE-440"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "other",
          "text": "Use of a Broken or Risky Cryptographic Algorithm",
          "title": "CWE-327"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6129",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json"
        }
      ],
      "title": "CVE-2023-6129"
    },
    {
      "cve": "CVE-2023-6237",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6237",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6237.json"
        }
      ],
      "title": "CVE-2023-6237"
    },
    {
      "cve": "CVE-2023-6516",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Memory Allocation with Excessive Size Value",
          "title": "CWE-789"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6516",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6516.json"
        }
      ],
      "title": "CVE-2023-6516"
    },
    {
      "cve": "CVE-2023-7104",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-7104",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7104.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2023-7104"
    },
    {
      "cve": "CVE-2023-28450",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1613504",
          "CSAFPID-1613505",
          "CSAFPID-1613506",
          "CSAFPID-1613507",
          "CSAFPID-1613592",
          "CSAFPID-1613593",
          "CSAFPID-1613594",
          "CSAFPID-1613595",
          "CSAFPID-1613596",
          "CSAFPID-1613597",
          "CSAFPID-1613598"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-28450",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28450.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1613504",
            "CSAFPID-1613505",
            "CSAFPID-1613506",
            "CSAFPID-1613507",
            "CSAFPID-1613592",
            "CSAFPID-1613593",
            "CSAFPID-1613594",
            "CSAFPID-1613595",
            "CSAFPID-1613596",
            "CSAFPID-1613597",
            "CSAFPID-1613598"
          ]
        }
      ],
      "title": "CVE-2023-28450"
    },
    {
      "cve": "CVE-2023-30584",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-30584",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-30584.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-30584"
    },
    {
      "cve": "CVE-2023-32002",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        },
        {
          "category": "other",
          "text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
          "title": "CWE-1268"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32002",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32002.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32002"
    },
    {
      "cve": "CVE-2023-32003",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32003",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32003.json"
        }
      ],
      "title": "CVE-2023-32003"
    },
    {
      "cve": "CVE-2023-32004",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32004",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32004.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32004"
    },
    {
      "cve": "CVE-2023-32005",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32005",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32005.json"
        }
      ],
      "title": "CVE-2023-32005"
    },
    {
      "cve": "CVE-2023-32006",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Exposure of Sensitive Information Due to Incompatible Policies",
          "title": "CWE-213"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32006",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32006.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32006"
    },
    {
      "cve": "CVE-2023-32558",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32558",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32558.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32558"
    },
    {
      "cve": "CVE-2023-32559",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32559",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32559.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32559"
    },
    {
      "cve": "CVE-2023-32736",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712825",
          "CSAFPID-1712826",
          "CSAFPID-1703190",
          "CSAFPID-1703191",
          "CSAFPID-1500667",
          "CSAFPID-1703187",
          "CSAFPID-1703188",
          "CSAFPID-1703189",
          "CSAFPID-1703192",
          "CSAFPID-1703193",
          "CSAFPID-1703194",
          "CSAFPID-1702687",
          "CSAFPID-1702688",
          "CSAFPID-1703195",
          "CSAFPID-1702694",
          "CSAFPID-1703196",
          "CSAFPID-1703197",
          "CSAFPID-1703198",
          "CSAFPID-1703199",
          "CSAFPID-1703200",
          "CSAFPID-1703201",
          "CSAFPID-1703202",
          "CSAFPID-1703203",
          "CSAFPID-1703204",
          "CSAFPID-1703205",
          "CSAFPID-1703206",
          "CSAFPID-1703207",
          "CSAFPID-1712827",
          "CSAFPID-1712828",
          "CSAFPID-1712829"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32736",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32736.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712825",
            "CSAFPID-1712826",
            "CSAFPID-1703190",
            "CSAFPID-1703191",
            "CSAFPID-1500667",
            "CSAFPID-1703187",
            "CSAFPID-1703188",
            "CSAFPID-1703189",
            "CSAFPID-1703192",
            "CSAFPID-1703193",
            "CSAFPID-1703194",
            "CSAFPID-1702687",
            "CSAFPID-1702688",
            "CSAFPID-1703195",
            "CSAFPID-1702694",
            "CSAFPID-1703196",
            "CSAFPID-1703197",
            "CSAFPID-1703198",
            "CSAFPID-1703199",
            "CSAFPID-1703200",
            "CSAFPID-1703201",
            "CSAFPID-1703202",
            "CSAFPID-1703203",
            "CSAFPID-1703204",
            "CSAFPID-1703205",
            "CSAFPID-1703206",
            "CSAFPID-1703207",
            "CSAFPID-1712827",
            "CSAFPID-1712828",
            "CSAFPID-1712829"
          ]
        }
      ],
      "title": "CVE-2023-32736"
    },
    {
      "cve": "CVE-2023-38552",
      "cwe": {
        "id": "CWE-354",
        "name": "Improper Validation of Integrity Check Value"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Integrity Check Value",
          "title": "CWE-354"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38552",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38552.json"
        }
      ],
      "title": "CVE-2023-38552"
    },
    {
      "cve": "CVE-2023-38709",
      "cwe": {
        "id": "CWE-113",
        "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
          "title": "CWE-113"
        },
        {
          "category": "other",
          "text": "Improper Validation of Specified Quantity in Input",
          "title": "CWE-1284"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38709",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json"
        }
      ],
      "title": "CVE-2023-38709"
    },
    {
      "cve": "CVE-2023-39331",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-39331",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39331.json"
        }
      ],
      "title": "CVE-2023-39331"
    },
    {
      "cve": "CVE-2023-39332",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-39332",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39332.json"
        }
      ],
      "title": "CVE-2023-39332"
    },
    {
      "cve": "CVE-2023-39333",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-39333",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39333.json"
        }
      ],
      "title": "CVE-2023-39333"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-309392",
          "CSAFPID-1615259",
          "CSAFPID-1703173"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-44487",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-309392",
            "CSAFPID-1615259",
            "CSAFPID-1703173"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-45143",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-45143",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45143.json"
        }
      ],
      "title": "CVE-2023-45143"
    },
    {
      "cve": "CVE-2023-46218",
      "cwe": {
        "id": "CWE-201",
        "name": "Insertion of Sensitive Information Into Sent Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insertion of Sensitive Information Into Sent Data",
          "title": "CWE-201"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46218",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703180",
            "CSAFPID-1703181",
            "CSAFPID-1703182",
            "CSAFPID-1703183",
            "CSAFPID-1703184",
            "CSAFPID-1703185",
            "CSAFPID-1703186"
          ]
        }
      ],
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46219",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703180",
            "CSAFPID-1703181",
            "CSAFPID-1703182",
            "CSAFPID-1703183",
            "CSAFPID-1703184",
            "CSAFPID-1703185",
            "CSAFPID-1703186"
          ]
        }
      ],
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-46280",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1458012",
          "CSAFPID-309392",
          "CSAFPID-1625338",
          "CSAFPID-1625340",
          "CSAFPID-1625341",
          "CSAFPID-75563",
          "CSAFPID-1625342",
          "CSAFPID-165765",
          "CSAFPID-1625345",
          "CSAFPID-766087",
          "CSAFPID-1637559",
          "CSAFPID-1637560",
          "CSAFPID-1637561",
          "CSAFPID-1637909",
          "CSAFPID-1637910",
          "CSAFPID-1637849",
          "CSAFPID-1637850",
          "CSAFPID-1637851",
          "CSAFPID-1637911",
          "CSAFPID-1501190",
          "CSAFPID-1637912",
          "CSAFPID-1637856",
          "CSAFPID-1637913",
          "CSAFPID-1637914",
          "CSAFPID-1637915",
          "CSAFPID-1637916",
          "CSAFPID-1637917",
          "CSAFPID-1637887",
          "CSAFPID-1501188",
          "CSAFPID-1501192",
          "CSAFPID-1637854",
          "CSAFPID-1501193",
          "CSAFPID-1501191",
          "CSAFPID-1501189",
          "CSAFPID-1615531",
          "CSAFPID-1615256",
          "CSAFPID-1615257",
          "CSAFPID-1615258",
          "CSAFPID-1637618",
          "CSAFPID-1470060",
          "CSAFPID-1470061",
          "CSAFPID-1470062",
          "CSAFPID-1470063",
          "CSAFPID-1470064",
          "CSAFPID-1457909",
          "CSAFPID-1470065",
          "CSAFPID-1470066",
          "CSAFPID-1457855",
          "CSAFPID-1457956",
          "CSAFPID-1457957",
          "CSAFPID-1457958",
          "CSAFPID-1470067",
          "CSAFPID-1457960",
          "CSAFPID-1457961",
          "CSAFPID-1457962",
          "CSAFPID-1457963",
          "CSAFPID-1470068",
          "CSAFPID-1457965",
          "CSAFPID-1457966",
          "CSAFPID-1457967",
          "CSAFPID-1470069",
          "CSAFPID-1470070",
          "CSAFPID-1470071",
          "CSAFPID-1470072",
          "CSAFPID-1458014",
          "CSAFPID-1458015",
          "CSAFPID-1458016",
          "CSAFPID-1458017",
          "CSAFPID-1470073",
          "CSAFPID-75533",
          "CSAFPID-1472069",
          "CSAFPID-1472073",
          "CSAFPID-74792",
          "CSAFPID-74794",
          "CSAFPID-1457906",
          "CSAFPID-1457907",
          "CSAFPID-1457908"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46280",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46280.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1458012",
            "CSAFPID-309392",
            "CSAFPID-1625338",
            "CSAFPID-1625340",
            "CSAFPID-1625341",
            "CSAFPID-75563",
            "CSAFPID-1625342",
            "CSAFPID-165765",
            "CSAFPID-1625345",
            "CSAFPID-766087",
            "CSAFPID-1637559",
            "CSAFPID-1637560",
            "CSAFPID-1637561",
            "CSAFPID-1637909",
            "CSAFPID-1637910",
            "CSAFPID-1637849",
            "CSAFPID-1637850",
            "CSAFPID-1637851",
            "CSAFPID-1637911",
            "CSAFPID-1501190",
            "CSAFPID-1637912",
            "CSAFPID-1637856",
            "CSAFPID-1637913",
            "CSAFPID-1637914",
            "CSAFPID-1637915",
            "CSAFPID-1637916",
            "CSAFPID-1637917",
            "CSAFPID-1637887",
            "CSAFPID-1501188",
            "CSAFPID-1501192",
            "CSAFPID-1637854",
            "CSAFPID-1501193",
            "CSAFPID-1501191",
            "CSAFPID-1501189",
            "CSAFPID-1615531",
            "CSAFPID-1615256",
            "CSAFPID-1615257",
            "CSAFPID-1615258",
            "CSAFPID-1637618",
            "CSAFPID-1470060",
            "CSAFPID-1470061",
            "CSAFPID-1470062",
            "CSAFPID-1470063",
            "CSAFPID-1470064",
            "CSAFPID-1457909",
            "CSAFPID-1470065",
            "CSAFPID-1470066",
            "CSAFPID-1457855",
            "CSAFPID-1457956",
            "CSAFPID-1457957",
            "CSAFPID-1457958",
            "CSAFPID-1470067",
            "CSAFPID-1457960",
            "CSAFPID-1457961",
            "CSAFPID-1457962",
            "CSAFPID-1457963",
            "CSAFPID-1470068",
            "CSAFPID-1457965",
            "CSAFPID-1457966",
            "CSAFPID-1457967",
            "CSAFPID-1470069",
            "CSAFPID-1470070",
            "CSAFPID-1470071",
            "CSAFPID-1470072",
            "CSAFPID-1458014",
            "CSAFPID-1458015",
            "CSAFPID-1458016",
            "CSAFPID-1458017",
            "CSAFPID-1470073",
            "CSAFPID-75533",
            "CSAFPID-1472069",
            "CSAFPID-1472073",
            "CSAFPID-74792",
            "CSAFPID-74794",
            "CSAFPID-1457906",
            "CSAFPID-1457907",
            "CSAFPID-1457908"
          ]
        }
      ],
      "title": "CVE-2023-46280"
    },
    {
      "cve": "CVE-2023-46809",
      "cwe": {
        "id": "CWE-208",
        "name": "Observable Timing Discrepancy"
      },
      "notes": [
        {
          "category": "other",
          "text": "Observable Timing Discrepancy",
          "title": "CWE-208"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46809",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46809.json"
        }
      ],
      "title": "CVE-2023-46809"
    },
    {
      "cve": "CVE-2023-47038",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-47038",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47038.json"
        }
      ],
      "title": "CVE-2023-47038"
    },
    {
      "cve": "CVE-2023-47039",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-47039",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47039.json"
        }
      ],
      "title": "CVE-2023-47039"
    },
    {
      "cve": "CVE-2023-47100",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-47100",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47100.json"
        }
      ],
      "title": "CVE-2023-47100"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Truncation of Security-relevant Information",
          "title": "CWE-222"
        },
        {
          "category": "other",
          "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
          "title": "CWE-757"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615259",
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-48795",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615259",
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-49441",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-49441",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49441.json"
        }
      ],
      "title": "CVE-2023-49441"
    },
    {
      "cve": "CVE-2023-50387",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-50387",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50387.json"
        }
      ],
      "title": "CVE-2023-50387"
    },
    {
      "cve": "CVE-2023-50868",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-50868",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
        }
      ],
      "title": "CVE-2023-50868"
    },
    {
      "cve": "CVE-2023-52389",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-52389",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52389.json"
        }
      ],
      "title": "CVE-2023-52389"
    },
    {
      "cve": "CVE-2024-0232",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0232",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
        }
      ],
      "title": "CVE-2024-0232"
    },
    {
      "cve": "CVE-2024-0727",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1613729",
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0727",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1613729",
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-2004",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Cleartext Transmission of Sensitive Information",
          "title": "CWE-319"
        },
        {
          "category": "other",
          "text": "Misinterpretation of Input",
          "title": "CWE-115"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Interpretation Conflict",
          "title": "CWE-436"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-894438"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2004",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-894438"
          ]
        }
      ],
      "title": "CVE-2024-2004"
    },
    {
      "cve": "CVE-2024-2379",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Certificate Validation",
          "title": "CWE-295"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-894438"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2379",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2379.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-894438"
          ]
        }
      ],
      "title": "CVE-2024-2379"
    },
    {
      "cve": "CVE-2024-2398",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        },
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-894438"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2398",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-894438"
          ]
        }
      ],
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-2466",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Certificate Validation",
          "title": "CWE-295"
        },
        {
          "category": "other",
          "text": "Improper Validation of Certificate with Host Mismatch",
          "title": "CWE-297"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-894438"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2466",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-894438"
          ]
        }
      ],
      "title": "CVE-2024-2466"
    },
    {
      "cve": "CVE-2024-2511",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improperly Controlled Sequential Memory Allocation",
          "title": "CWE-1325"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2511",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2024-2511"
    },
    {
      "cve": "CVE-2024-4603",
      "cwe": {
        "id": "CWE-606",
        "name": "Unchecked Input for Loop Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        },
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4603",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
        }
      ],
      "title": "CVE-2024-4603"
    },
    {
      "cve": "CVE-2024-4741",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4741",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
        }
      ],
      "title": "CVE-2024-4741"
    },
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5535",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-5594",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5594",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5594.json"
        }
      ],
      "title": "CVE-2024-5594"
    },
    {
      "cve": "CVE-2024-21890",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Insufficient Technical Documentation",
          "title": "CWE-1059"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21890",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21890.json"
        }
      ],
      "title": "CVE-2024-21890"
    },
    {
      "cve": "CVE-2024-21891",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21891.json"
        }
      ],
      "title": "CVE-2024-21891"
    },
    {
      "cve": "CVE-2024-21892",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21892",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21892.json"
        }
      ],
      "title": "CVE-2024-21892"
    },
    {
      "cve": "CVE-2024-21896",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21896",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21896.json"
        }
      ],
      "title": "CVE-2024-21896"
    },
    {
      "cve": "CVE-2024-22017",
      "cwe": {
        "id": "CWE-271",
        "name": "Privilege Dropping / Lowering Errors"
      },
      "notes": [
        {
          "category": "other",
          "text": "Privilege Dropping / Lowering Errors",
          "title": "CWE-271"
        },
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22017",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22017.json"
        }
      ],
      "title": "CVE-2024-22017"
    },
    {
      "cve": "CVE-2024-22019",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22019",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json"
        }
      ],
      "title": "CVE-2024-22019"
    },
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22025",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22025.json"
        }
      ],
      "title": "CVE-2024-22025"
    },
    {
      "cve": "CVE-2024-24758",
      "cwe": {
        "id": "CWE-942",
        "name": "Permissive Cross-domain Policy with Untrusted Domains"
      },
      "notes": [
        {
          "category": "other",
          "text": "Permissive Cross-domain Policy with Untrusted Domains",
          "title": "CWE-942"
        },
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24758",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24758.json"
        }
      ],
      "title": "CVE-2024-24758"
    },
    {
      "cve": "CVE-2024-24795",
      "cwe": {
        "id": "CWE-113",
        "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
          "title": "CWE-113"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24795",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24795.json"
        }
      ],
      "title": "CVE-2024-24795"
    },
    {
      "cve": "CVE-2024-24806",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24806",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24806.json"
        }
      ],
      "title": "CVE-2024-24806"
    },
    {
      "cve": "CVE-2024-26306",
      "cwe": {
        "id": "CWE-310",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-310",
          "title": "CWE-310"
        },
        {
          "category": "other",
          "text": "Observable Discrepancy",
          "title": "CWE-203"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26306",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26306.json"
        }
      ],
      "title": "CVE-2024-26306"
    },
    {
      "cve": "CVE-2024-26925",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Improper Locking",
          "title": "CWE-667"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26925",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26925.json"
        }
      ],
      "title": "CVE-2024-26925"
    },
    {
      "cve": "CVE-2024-27316",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-27316",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json"
        }
      ],
      "title": "CVE-2024-27316"
    },
    {
      "cve": "CVE-2024-27980",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-27980",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27980.json"
        }
      ],
      "title": "CVE-2024-27980"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-27982",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27982.json"
        }
      ],
      "title": "CVE-2024-27982"
    },
    {
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-27983",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
        }
      ],
      "title": "CVE-2024-27983"
    },
    {
      "cve": "CVE-2024-28882",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28882",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28882.json"
        }
      ],
      "title": "CVE-2024-28882"
    },
    {
      "cve": "CVE-2024-29119",
      "cwe": {
        "id": "CWE-266",
        "name": "Incorrect Privilege Assignment"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Privilege Assignment",
          "title": "CWE-266"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-524281"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29119",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29119.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-524281"
          ]
        }
      ],
      "title": "CVE-2024-29119"
    },
    {
      "cve": "CVE-2024-36140",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712832",
          "CSAFPID-1712833"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-36140",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36140.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712832",
            "CSAFPID-1712833"
          ]
        }
      ],
      "title": "CVE-2024-36140"
    },
    {
      "cve": "CVE-2024-44102",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712834",
          "CSAFPID-1712835",
          "CSAFPID-1712836",
          "CSAFPID-1712837",
          "CSAFPID-1712838",
          "CSAFPID-1712839",
          "CSAFPID-1712840",
          "CSAFPID-1712841",
          "CSAFPID-1712842",
          "CSAFPID-1712843",
          "CSAFPID-1712844",
          "CSAFPID-1712845",
          "CSAFPID-1712846"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-44102",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44102.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712834",
            "CSAFPID-1712835",
            "CSAFPID-1712836",
            "CSAFPID-1712837",
            "CSAFPID-1712838",
            "CSAFPID-1712839",
            "CSAFPID-1712840",
            "CSAFPID-1712841",
            "CSAFPID-1712842",
            "CSAFPID-1712843",
            "CSAFPID-1712844",
            "CSAFPID-1712845",
            "CSAFPID-1712846"
          ]
        }
      ],
      "title": "CVE-2024-44102"
    },
    {
      "cve": "CVE-2024-46888",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46888",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46888.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46888"
    },
    {
      "cve": "CVE-2024-46889",
      "cwe": {
        "id": "CWE-321",
        "name": "Use of Hard-coded Cryptographic Key"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Hard-coded Cryptographic Key",
          "title": "CWE-321"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46889",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46889.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46889"
    },
    {
      "cve": "CVE-2024-46890",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46890",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46890.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46890"
    },
    {
      "cve": "CVE-2024-46891",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46891.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46891"
    },
    {
      "cve": "CVE-2024-46892",
      "cwe": {
        "id": "CWE-613",
        "name": "Insufficient Session Expiration"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Session Expiration",
          "title": "CWE-613"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46892",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46892.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46892"
    },
    {
      "cve": "CVE-2024-46894",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46894",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46894.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46894"
    },
    {
      "cve": "CVE-2024-47783",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712847"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47783",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47783.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712847"
          ]
        }
      ],
      "title": "CVE-2024-47783"
    },
    {
      "cve": "CVE-2024-47808",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47808",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47808.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2024-47808"
    },
    {
      "cve": "CVE-2024-47940",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1680248"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47940",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47940.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1680248"
          ]
        }
      ],
      "title": "CVE-2024-47940"
    },
    {
      "cve": "CVE-2024-47941",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1680248"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47941",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47941.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1680248"
          ]
        }
      ],
      "title": "CVE-2024-47941"
    },
    {
      "cve": "CVE-2024-47942",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Search Path Element",
          "title": "CWE-427"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1680248"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47942",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47942.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1680248"
          ]
        }
      ],
      "title": "CVE-2024-47942"
    },
    {
      "cve": "CVE-2024-50310",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712748"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50310",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50310.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712748"
          ]
        }
      ],
      "title": "CVE-2024-50310"
    },
    {
      "cve": "CVE-2024-50313",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1637622",
          "CSAFPID-1637623",
          "CSAFPID-1637624",
          "CSAFPID-1637625",
          "CSAFPID-1637626"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50313",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50313.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1637622",
            "CSAFPID-1637623",
            "CSAFPID-1637624",
            "CSAFPID-1637625",
            "CSAFPID-1637626"
          ]
        }
      ],
      "title": "CVE-2024-50313"
    },
    {
      "cve": "CVE-2024-50557",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50557",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50557.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50557"
    },
    {
      "cve": "CVE-2024-50558",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50558",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50558.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50558"
    },
    {
      "cve": "CVE-2024-50559",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50559",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50559.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50559"
    },
    {
      "cve": "CVE-2024-50560",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50560",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50560.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50560"
    },
    {
      "cve": "CVE-2024-50561",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50561",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50561.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50561"
    },
    {
      "cve": "CVE-2024-50572",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
          "title": "CWE-74"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50572",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50572.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50572"
    }
  ]
}
  ncsc-2024-0433
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDCOM, SCALANCE, SIMATIC en SINEC.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Cross-Site-Scripting (XSS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Unchecked Input for Loop Condition",
        "title": "CWE-606"
      },
      {
        "category": "general",
        "text": "Use of a Cryptographic Primitive with a Risky Implementation",
        "title": "CWE-1240"
      },
      {
        "category": "general",
        "text": "Misinterpretation of Input",
        "title": "CWE-115"
      },
      {
        "category": "general",
        "text": "Insufficient Technical Documentation",
        "title": "CWE-1059"
      },
      {
        "category": "general",
        "text": "Improperly Controlled Sequential Memory Allocation",
        "title": "CWE-1325"
      },
      {
        "category": "general",
        "text": "Truncation of Security-relevant Information",
        "title": "CWE-222"
      },
      {
        "category": "general",
        "text": "CWE-310",
        "title": "CWE-310"
      },
      {
        "category": "general",
        "text": "Use of Weak Hash",
        "title": "CWE-328"
      },
      {
        "category": "general",
        "text": "Improper Validation of Specified Quantity in Input",
        "title": "CWE-1284"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information Due to Incompatible Policies",
        "title": "CWE-213"
      },
      {
        "category": "general",
        "text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
        "title": "CWE-1268"
      },
      {
        "category": "general",
        "text": "Incorrect Provision of Specified Functionality",
        "title": "CWE-684"
      },
      {
        "category": "general",
        "text": "Missing Release of Resource after Effective Lifetime",
        "title": "CWE-772"
      },
      {
        "category": "general",
        "text": "Observable Timing Discrepancy",
        "title": "CWE-208"
      },
      {
        "category": "general",
        "text": "Insertion of Sensitive Information Into Sent Data",
        "title": "CWE-201"
      },
      {
        "category": "general",
        "text": "Excessive Iteration",
        "title": "CWE-834"
      },
      {
        "category": "general",
        "text": "Incorrect Privilege Assignment",
        "title": "CWE-266"
      },
      {
        "category": "general",
        "text": "Permissive Cross-domain Policy with Untrusted Domains",
        "title": "CWE-942"
      },
      {
        "category": "general",
        "text": "Privilege Dropping / Lowering Errors",
        "title": "CWE-271"
      },
      {
        "category": "general",
        "text": "Incorrect Permission Assignment for Critical Resource",
        "title": "CWE-732"
      },
      {
        "category": "general",
        "text": "Improper Locking",
        "title": "CWE-667"
      },
      {
        "category": "general",
        "text": "Expected Behavior Violation",
        "title": "CWE-440"
      },
      {
        "category": "general",
        "text": "Improper Validation of Certificate with Host Mismatch",
        "title": "CWE-297"
      },
      {
        "category": "general",
        "text": "Missing Encryption of Sensitive Data",
        "title": "CWE-311"
      },
      {
        "category": "general",
        "text": "Improper Check for Unusual or Exceptional Conditions",
        "title": "CWE-754"
      },
      {
        "category": "general",
        "text": "Reachable Assertion",
        "title": "CWE-617"
      },
      {
        "category": "general",
        "text": "Uncontrolled Search Path Element",
        "title": "CWE-427"
      },
      {
        "category": "general",
        "text": "Cleartext Transmission of Sensitive Information",
        "title": "CWE-319"
      },
      {
        "category": "general",
        "text": "Insufficient Session Expiration",
        "title": "CWE-613"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "Observable Discrepancy",
        "title": "CWE-203"
      },
      {
        "category": "general",
        "text": "Improper Validation of Integrity Check Value",
        "title": "CWE-354"
      },
      {
        "category": "general",
        "text": "Missing Cryptographic Step",
        "title": "CWE-325"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Use of Hard-coded Cryptographic Key",
        "title": "CWE-321"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "CWE-275",
        "title": "CWE-275"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Inefficient Regular Expression Complexity",
        "title": "CWE-1333"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
        "title": "CWE-113"
      },
      {
        "category": "general",
        "text": "Missing Release of Memory after Effective Lifetime",
        "title": "CWE-401"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Improper Certificate Validation",
        "title": "CWE-295"
      },
      {
        "category": "general",
        "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
        "title": "CWE-757"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Use of a Broken or Risky Cryptographic Algorithm",
        "title": "CWE-327"
      },
      {
        "category": "general",
        "text": "Interpretation Conflict",
        "title": "CWE-436"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
        "title": "CWE-74"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Server-Side Request Forgery (SSRF)",
        "title": "CWE-918"
      },
      {
        "category": "general",
        "text": "Incorrect Authorization",
        "title": "CWE-863"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Memory Allocation with Excessive Size Value",
        "title": "CWE-789"
      },
      {
        "category": "general",
        "text": "Improper Privilege Management",
        "title": "CWE-269"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Improper Authentication",
        "title": "CWE-287"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
        "title": "CWE-79"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-000297.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064257.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-230445.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-331112.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-351178.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-354112.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-454789.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616032.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-654798.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-871035.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-914892.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-915275.pdf"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Siemens producten",
    "tracking": {
      "current_release_date": "2024-11-12T14:19:20.051128Z",
      "id": "NCSC-2024-0433",
      "initial_release_date": "2024-11-12T14:19:20.051128Z",
      "revision_history": [
        {
          "date": "2024-11-12T14:19:20.051128Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "mendix_runtime_v10.12",
            "product": {
              "name": "mendix_runtime_v10.12",
              "product_id": "CSAFPID-1637623",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.12:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mendix_runtime_v10.6",
            "product": {
              "name": "mendix_runtime_v10.6",
              "product_id": "CSAFPID-1637624",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.6:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mendix_runtime_v10",
            "product": {
              "name": "mendix_runtime_v10",
              "product_id": "CSAFPID-1637622",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v10:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mendix_runtime_v8",
            "product": {
              "name": "mendix_runtime_v8",
              "product_id": "CSAFPID-1637625",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v8:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mendix_runtime_v9",
            "product": {
              "name": "mendix_runtime_v9",
              "product_id": "CSAFPID-1637626",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:mendix_runtime_v9:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ozw672",
            "product": {
              "name": "ozw672",
              "product_id": "CSAFPID-1712832",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ozw672:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ozw772",
            "product": {
              "name": "ozw772",
              "product_id": "CSAFPID-1712833",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ozw772:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
              "product_id": "CSAFPID-1712834",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_1000_to_5000_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
              "product_id": "CSAFPID-1712835",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_256_to_1000_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_32_to_64_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_32_to_64_v3.1",
              "product_id": "CSAFPID-1712836",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_32_to_64_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_64_to_256_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_64_to_256_v3.1",
              "product_id": "CSAFPID-1712837",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_64_to_256_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "pp_telecontrol_server_basic_8_to_32_v3.1",
            "product": {
              "name": "pp_telecontrol_server_basic_8_to_32_v3.1",
              "product_id": "CSAFPID-1712838",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_8_to_32_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_ape1808",
            "product": {
              "name": "ruggedcom_ape1808",
              "product_id": "CSAFPID-1615259",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_rm1224_lte_4g__eu",
            "product": {
              "name": "ruggedcom_rm1224_lte_4g__eu",
              "product_id": "CSAFPID-1702670",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_rm1224_lte_4g__nam",
            "product": {
              "name": "ruggedcom_rm1224_lte_4g__nam",
              "product_id": "CSAFPID-1702671",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "s7-pct",
            "product": {
              "name": "s7-pct",
              "product_id": "CSAFPID-1637909",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:s7-pct:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "s7-pct",
            "product": {
              "name": "s7-pct",
              "product_id": "CSAFPID-1470060",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:s7-pct:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "s7_port_configuration_tool",
            "product": {
              "name": "s7_port_configuration_tool",
              "product_id": "CSAFPID-1472074",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:s7_port_configuration_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m804pb",
            "product": {
              "name": "scalance_m804pb",
              "product_id": "CSAFPID-1702672",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m804pb:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m812-1_adsl-router",
            "product": {
              "name": "scalance_m812-1_adsl-router",
              "product_id": "CSAFPID-1712749",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m816-1_adsl-router",
            "product": {
              "name": "scalance_m816-1_adsl-router",
              "product_id": "CSAFPID-1712750",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m826-2_shdsl-router",
            "product": {
              "name": "scalance_m826-2_shdsl-router",
              "product_id": "CSAFPID-1702677",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m874-2",
            "product": {
              "name": "scalance_m874-2",
              "product_id": "CSAFPID-1702678",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m874-2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m874-3",
            "product": {
              "name": "scalance_m874-3",
              "product_id": "CSAFPID-1702679",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m874-3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m874-3_3g-router__cn_",
            "product": {
              "name": "scalance_m874-3_3g-router__cn_",
              "product_id": "CSAFPID-1712751",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m874-3_3g-router__cn_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-3",
            "product": {
              "name": "scalance_m876-3",
              "product_id": "CSAFPID-1712752",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-3__rok_",
            "product": {
              "name": "scalance_m876-3__rok_",
              "product_id": "CSAFPID-1702681",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-4",
            "product": {
              "name": "scalance_m876-4",
              "product_id": "CSAFPID-1712753",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-4__eu_",
            "product": {
              "name": "scalance_m876-4__eu_",
              "product_id": "CSAFPID-1702682",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_m876-4__nam_",
            "product": {
              "name": "scalance_m876-4__nam_",
              "product_id": "CSAFPID-1702683",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum853-1__a1_",
            "product": {
              "name": "scalance_mum853-1__a1_",
              "product_id": "CSAFPID-1712754",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum853-1__a1_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum853-1__b1_",
            "product": {
              "name": "scalance_mum853-1__b1_",
              "product_id": "CSAFPID-1712755",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum853-1__b1_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum853-1__eu_",
            "product": {
              "name": "scalance_mum853-1__eu_",
              "product_id": "CSAFPID-1712756",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__a1_",
            "product": {
              "name": "scalance_mum856-1__a1_",
              "product_id": "CSAFPID-1712757",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__a1_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__b1_",
            "product": {
              "name": "scalance_mum856-1__b1_",
              "product_id": "CSAFPID-1712758",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__b1_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__cn_",
            "product": {
              "name": "scalance_mum856-1__cn_",
              "product_id": "CSAFPID-1712759",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__cn_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__eu_",
            "product": {
              "name": "scalance_mum856-1__eu_",
              "product_id": "CSAFPID-1702684",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_mum856-1__row_",
            "product": {
              "name": "scalance_mum856-1__row_",
              "product_id": "CSAFPID-1702685",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_s615_eec_lan-router",
            "product": {
              "name": "scalance_s615_eec_lan-router",
              "product_id": "CSAFPID-1712760",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_s615_eec_lan-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_s615_lan-router",
            "product": {
              "name": "scalance_s615_lan-router",
              "product_id": "CSAFPID-1712761",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_s615_lan-router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xch328__6gk5328-4ts01-2ec2_",
            "product": {
              "name": "scalance_xch328__6gk5328-4ts01-2ec2_",
              "product_id": "CSAFPID-1613504",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xch328__6gk5328-4ts01-2ec2_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
            "product": {
              "name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
              "product_id": "CSAFPID-1613505",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xcm324__6gk5324-8ts01-2ac2_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
            "product": {
              "name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
              "product_id": "CSAFPID-1613506",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xcm328__6gk5328-4ts01-2ac2_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
            "product": {
              "name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
              "product_id": "CSAFPID-1613507",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xcm332__6gk5332-0ga01-2ac2_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
            "product": {
              "name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
              "product_id": "CSAFPID-1613592",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
            "product": {
              "name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
              "product_id": "CSAFPID-1613593",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
            "product": {
              "name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
              "product_id": "CSAFPID-1613594",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
            "product": {
              "name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
              "product_id": "CSAFPID-1613595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
            "product": {
              "name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
              "product_id": "CSAFPID-1613596",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
            "product": {
              "name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
              "product_id": "CSAFPID-1613597",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
            "product": {
              "name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
              "product_id": "CSAFPID-1613598",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "security_configuration_tool",
            "product": {
              "name": "security_configuration_tool",
              "product_id": "CSAFPID-1625339",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "security_configuration_tool__sct_",
            "product": {
              "name": "security_configuration_tool__sct_",
              "product_id": "CSAFPID-1637910",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "security_configuration_tool__sct_",
            "product": {
              "name": "security_configuration_tool__sct_",
              "product_id": "CSAFPID-1470061",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_automation_tool",
            "product": {
              "name": "simatic_automation_tool",
              "product_id": "CSAFPID-1472069",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_automation_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_automation_tool",
            "product": {
              "name": "simatic_automation_tool",
              "product_id": "CSAFPID-1637559",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_automation_tool:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_automation_tool",
            "product": {
              "name": "simatic_automation_tool",
              "product_id": "CSAFPID-1470062",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_automation_tool:all_versions:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_batch_v9.1",
            "product": {
              "name": "simatic_batch_v9.1",
              "product_id": "CSAFPID-1625340",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_batch_v9.1",
            "product": {
              "name": "simatic_batch_v9.1",
              "product_id": "CSAFPID-1470063",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_cp_1543-1_v4.0",
            "product": {
              "name": "simatic_cp_1543-1_v4.0",
              "product_id": "CSAFPID-1712748",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_cp_1543-1_v4.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_mv500_family",
            "product": {
              "name": "simatic_mv500_family",
              "product_id": "CSAFPID-1703073",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_mv500_family:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc-software",
            "product": {
              "name": "simatic_net_pc-software",
              "product_id": "CSAFPID-1625344",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc-software:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software",
            "product": {
              "name": "simatic_net_pc_software",
              "product_id": "CSAFPID-1470064",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v16",
            "product": {
              "name": "simatic_net_pc_software_v16",
              "product_id": "CSAFPID-1637849",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v16",
            "product": {
              "name": "simatic_net_pc_software_v16",
              "product_id": "CSAFPID-1457906",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v17",
            "product": {
              "name": "simatic_net_pc_software_v17",
              "product_id": "CSAFPID-1637850",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v17",
            "product": {
              "name": "simatic_net_pc_software_v17",
              "product_id": "CSAFPID-1457907",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v18",
            "product": {
              "name": "simatic_net_pc_software_v18",
              "product_id": "CSAFPID-1637851",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v18",
            "product": {
              "name": "simatic_net_pc_software_v18",
              "product_id": "CSAFPID-1457908",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v19",
            "product": {
              "name": "simatic_net_pc_software_v19",
              "product_id": "CSAFPID-1637911",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software_v19",
            "product": {
              "name": "simatic_net_pc_software_v19",
              "product_id": "CSAFPID-1637560",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pcs",
            "product": {
              "name": "simatic_pcs",
              "product_id": "CSAFPID-838530",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pcs:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pcs_7_v9.1",
            "product": {
              "name": "simatic_pcs_7_v9.1",
              "product_id": "CSAFPID-1501190",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pcs_7_v9.1",
            "product": {
              "name": "simatic_pcs_7_v9.1",
              "product_id": "CSAFPID-1457909",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pdm_v9.2",
            "product": {
              "name": "simatic_pdm_v9.2",
              "product_id": "CSAFPID-1637912",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pdm_v9.2",
            "product": {
              "name": "simatic_pdm_v9.2",
              "product_id": "CSAFPID-1470065",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_route_control_",
            "product": {
              "name": "simatic_route_control_",
              "product_id": "CSAFPID-1625337",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_route_control_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_route_control_v9.1",
            "product": {
              "name": "simatic_route_control_v9.1",
              "product_id": "CSAFPID-1637856",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_route_control_v9.1",
            "product": {
              "name": "simatic_route_control_v9.1",
              "product_id": "CSAFPID-1470066",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager",
            "product": {
              "name": "simatic_rtls_locating_manager",
              "product_id": "CSAFPID-1691398",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager:3.0.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-0da00_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-0da00_",
              "product_id": "CSAFPID-1703180",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da00_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-0da10_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-0da10_",
              "product_id": "CSAFPID-1703181",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da10_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-0da20_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-0da20_",
              "product_id": "CSAFPID-1703182",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da20_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-0da30_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-0da30_",
              "product_id": "CSAFPID-1703183",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da30_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
              "product_id": "CSAFPID-1703184",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea10_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
              "product_id": "CSAFPID-1703185",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea20_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
            "product": {
              "name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
              "product_id": "CSAFPID-1703186",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea30_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
            "product": {
              "name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
              "product_id": "CSAFPID-1615260",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
            "product": {
              "name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
              "product_id": "CSAFPID-1615261",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
            "product": {
              "name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
              "product_id": "CSAFPID-1615262",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
            "product": {
              "name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
              "product_id": "CSAFPID-1615263",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
            "product": {
              "name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
              "product_id": "CSAFPID-1703131",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-plcsim_v16",
            "product": {
              "name": "simatic_s7-plcsim_v16",
              "product_id": "CSAFPID-1712825",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-plcsim_v17",
            "product": {
              "name": "simatic_s7-plcsim_v17",
              "product_id": "CSAFPID-1712826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_safety_v16",
            "product": {
              "name": "simatic_step_7_safety_v16",
              "product_id": "CSAFPID-1703190",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_safety_v17",
            "product": {
              "name": "simatic_step_7_safety_v17",
              "product_id": "CSAFPID-1703191",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_safety_v18",
            "product": {
              "name": "simatic_step_7_safety_v18",
              "product_id": "CSAFPID-1500667",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v16",
            "product": {
              "name": "simatic_step_7_v16",
              "product_id": "CSAFPID-1703187",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v17",
            "product": {
              "name": "simatic_step_7_v17",
              "product_id": "CSAFPID-1703188",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v18",
            "product": {
              "name": "simatic_step_7_v18",
              "product_id": "CSAFPID-1703189",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v5",
            "product": {
              "name": "simatic_step_7_v5",
              "product_id": "CSAFPID-1637913",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7_v5",
            "product": {
              "name": "simatic_step_7_v5",
              "product_id": "CSAFPID-1457855",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-75563",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-1550826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc:8.0:update_5:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.17",
            "product": {
              "name": "simatic_wincc_oa_v3.17",
              "product_id": "CSAFPID-1637914",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.17",
            "product": {
              "name": "simatic_wincc_oa_v3.17",
              "product_id": "CSAFPID-1457956",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.18",
            "product": {
              "name": "simatic_wincc_oa_v3.18",
              "product_id": "CSAFPID-1637915",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.18",
            "product": {
              "name": "simatic_wincc_oa_v3.18",
              "product_id": "CSAFPID-1457957",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.19",
            "product": {
              "name": "simatic_wincc_oa_v3.19",
              "product_id": "CSAFPID-1637916",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa_v3.19",
            "product": {
              "name": "simatic_wincc_oa_v3.19",
              "product_id": "CSAFPID-1457958",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_advanced",
            "product": {
              "name": "simatic_wincc_runtime_advanced",
              "product_id": "CSAFPID-766087",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_advanced",
            "product": {
              "name": "simatic_wincc_runtime_advanced",
              "product_id": "CSAFPID-1470067",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-165765",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v16",
            "product": {
              "name": "simatic_wincc_runtime_professional_v16",
              "product_id": "CSAFPID-1637917",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v16",
            "product": {
              "name": "simatic_wincc_runtime_professional_v16",
              "product_id": "CSAFPID-1457960",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v17",
            "product": {
              "name": "simatic_wincc_runtime_professional_v17",
              "product_id": "CSAFPID-1637887",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v17",
            "product": {
              "name": "simatic_wincc_runtime_professional_v17",
              "product_id": "CSAFPID-1457961",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v18",
            "product": {
              "name": "simatic_wincc_runtime_professional_v18",
              "product_id": "CSAFPID-1501188",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v18",
            "product": {
              "name": "simatic_wincc_runtime_professional_v18",
              "product_id": "CSAFPID-1457962",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v19",
            "product": {
              "name": "simatic_wincc_runtime_professional_v19",
              "product_id": "CSAFPID-1501192",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional_v19",
            "product": {
              "name": "simatic_wincc_runtime_professional_v19",
              "product_id": "CSAFPID-1457963",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_pc_runtime",
            "product": {
              "name": "simatic_wincc_unified_pc_runtime",
              "product_id": "CSAFPID-744621",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_pc_runtime",
            "product": {
              "name": "simatic_wincc_unified_pc_runtime",
              "product_id": "CSAFPID-1470068",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_pc_runtime_v18",
            "product": {
              "name": "simatic_wincc_unified_pc_runtime_v18",
              "product_id": "CSAFPID-1637854",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_pc_runtime_v18",
            "product": {
              "name": "simatic_wincc_unified_pc_runtime_v18",
              "product_id": "CSAFPID-1637561",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_v16",
            "product": {
              "name": "simatic_wincc_unified_v16",
              "product_id": "CSAFPID-1703192",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_v17",
            "product": {
              "name": "simatic_wincc_unified_v17",
              "product_id": "CSAFPID-1703193",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_unified_v18",
            "product": {
              "name": "simatic_wincc_unified_v18",
              "product_id": "CSAFPID-1703194",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v16",
            "product": {
              "name": "simatic_wincc_v16",
              "product_id": "CSAFPID-1702687",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v17",
            "product": {
              "name": "simatic_wincc_v17",
              "product_id": "CSAFPID-1702688",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v18",
            "product": {
              "name": "simatic_wincc_v18",
              "product_id": "CSAFPID-1703195",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v7.4",
            "product": {
              "name": "simatic_wincc_v7.4",
              "product_id": "CSAFPID-1501193",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v7.4",
            "product": {
              "name": "simatic_wincc_v7.4",
              "product_id": "CSAFPID-1457965",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v7.5",
            "product": {
              "name": "simatic_wincc_v7.5",
              "product_id": "CSAFPID-1501191",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v7.5",
            "product": {
              "name": "simatic_wincc_v7.5",
              "product_id": "CSAFPID-1457966",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v8.0",
            "product": {
              "name": "simatic_wincc_v8.0",
              "product_id": "CSAFPID-1501189",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_v8.0",
            "product": {
              "name": "simatic_wincc_v8.0",
              "product_id": "CSAFPID-1457967",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simocode_es_v16",
            "product": {
              "name": "simocode_es_v16",
              "product_id": "CSAFPID-1702694",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simocode_es_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simocode_es_v17",
            "product": {
              "name": "simocode_es_v17",
              "product_id": "CSAFPID-1703196",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simocode_es_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simocode_es_v18",
            "product": {
              "name": "simocode_es_v18",
              "product_id": "CSAFPID-1703197",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simocode_es_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simotion_scout_tia_v5.4_sp1",
            "product": {
              "name": "simotion_scout_tia_v5.4_sp1",
              "product_id": "CSAFPID-1703198",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simotion_scout_tia_v5.4_sp3",
            "product": {
              "name": "simotion_scout_tia_v5.4_sp3",
              "product_id": "CSAFPID-1703199",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simotion_scout_tia_v5.5_sp1",
            "product": {
              "name": "simotion_scout_tia_v5.5_sp1",
              "product_id": "CSAFPID-1703200",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.5_sp1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive",
            "product": {
              "name": "sinamics_startdrive",
              "product_id": "CSAFPID-1625341",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive",
            "product": {
              "name": "sinamics_startdrive",
              "product_id": "CSAFPID-1470069",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive_v16",
            "product": {
              "name": "sinamics_startdrive_v16",
              "product_id": "CSAFPID-1703201",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive_v17",
            "product": {
              "name": "sinamics_startdrive_v17",
              "product_id": "CSAFPID-1703202",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinamics_startdrive_v18",
            "product": {
              "name": "sinamics_startdrive_v18",
              "product_id": "CSAFPID-1703203",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_ins",
            "product": {
              "name": "sinec_ins",
              "product_id": "CSAFPID-746925",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_network_management_system",
            "product": {
              "name": "sinec_network_management_system",
              "product_id": "CSAFPID-1691397",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_network_management_system:2.0:sp1:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_nms",
            "product": {
              "name": "sinec_nms",
              "product_id": "CSAFPID-309392",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_nms",
            "product": {
              "name": "sinec_nms",
              "product_id": "CSAFPID-1458012",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_nms:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_nms",
            "product": {
              "name": "sinec_nms",
              "product_id": "CSAFPID-1693062",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_nms:2.0:sp2:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinec_nms",
            "product": {
              "name": "sinec_nms",
              "product_id": "CSAFPID-1691473",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinec_nms:3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinema_remote_connect_client",
            "product": {
              "name": "sinema_remote_connect_client",
              "product_id": "CSAFPID-894438",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinumerik_one_virtual",
            "product": {
              "name": "sinumerik_one_virtual",
              "product_id": "CSAFPID-1625342",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinumerik_one_virtual",
            "product": {
              "name": "sinumerik_one_virtual",
              "product_id": "CSAFPID-1470070",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinumerik_plc_programming_tool",
            "product": {
              "name": "sinumerik_plc_programming_tool",
              "product_id": "CSAFPID-1625338",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sinumerik_plc_programming_tool",
            "product": {
              "name": "sinumerik_plc_programming_tool",
              "product_id": "CSAFPID-1470071",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
            "product": {
              "name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
              "product_id": "CSAFPID-1615264",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siport",
            "product": {
              "name": "siport",
              "product_id": "CSAFPID-1712847",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:siport:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sirius_safety_es_v17",
            "product": {
              "name": "sirius_safety_es_v17",
              "product_id": "CSAFPID-1703204",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sirius_safety_es_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sirius_safety_es_v18",
            "product": {
              "name": "sirius_safety_es_v18",
              "product_id": "CSAFPID-1703205",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sirius_safety_es_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sirius_soft_starter_es_v17",
            "product": {
              "name": "sirius_soft_starter_es_v17",
              "product_id": "CSAFPID-1703206",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "sirius_soft_starter_es_v18",
            "product": {
              "name": "sirius_soft_starter_es_v18",
              "product_id": "CSAFPID-1703207",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "solid_edge_se2024",
            "product": {
              "name": "solid_edge_se2024",
              "product_id": "CSAFPID-1680248",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "spectrum_power_7",
            "product": {
              "name": "spectrum_power_7",
              "product_id": "CSAFPID-524281",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "st7_scadaconnect",
            "product": {
              "name": "st7_scadaconnect",
              "product_id": "CSAFPID-1691077",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:st7_scadaconnect:1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
            "product": {
              "name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
              "product_id": "CSAFPID-1703173",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:st7_scadaconnect__6nh7997-5da10-0aa0_:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic",
            "product": {
              "name": "telecontrol_server_basic",
              "product_id": "CSAFPID-1691051",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic:3.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_1000_v3.1",
            "product": {
              "name": "telecontrol_server_basic_1000_v3.1",
              "product_id": "CSAFPID-1712839",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_1000_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_256_v3.1",
            "product": {
              "name": "telecontrol_server_basic_256_v3.1",
              "product_id": "CSAFPID-1712840",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_256_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_32_v3.1",
            "product": {
              "name": "telecontrol_server_basic_32_v3.1",
              "product_id": "CSAFPID-1712841",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_32_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_5000_v3.1",
            "product": {
              "name": "telecontrol_server_basic_5000_v3.1",
              "product_id": "CSAFPID-1712842",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_5000_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_64_v3.1",
            "product": {
              "name": "telecontrol_server_basic_64_v3.1",
              "product_id": "CSAFPID-1712843",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_64_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_8_v3.1",
            "product": {
              "name": "telecontrol_server_basic_8_v3.1",
              "product_id": "CSAFPID-1712844",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_8_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_serv_upgr",
            "product": {
              "name": "telecontrol_server_basic_serv_upgr",
              "product_id": "CSAFPID-1712845",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_serv_upgr:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_upgr_v3.1",
            "product": {
              "name": "telecontrol_server_basic_upgr_v3.1",
              "product_id": "CSAFPID-1712846",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_upgr_v3.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "telecontrol_server_basic_v3",
            "product": {
              "name": "telecontrol_server_basic_v3",
              "product_id": "CSAFPID-1637855",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_v3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_connector",
            "product": {
              "name": "tia_portal_cloud_connector",
              "product_id": "CSAFPID-1625345",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_connector",
            "product": {
              "name": "tia_portal_cloud_connector",
              "product_id": "CSAFPID-1470072",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_v16",
            "product": {
              "name": "tia_portal_cloud_v16",
              "product_id": "CSAFPID-1712827",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_v17",
            "product": {
              "name": "tia_portal_cloud_v17",
              "product_id": "CSAFPID-1712828",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "tia_portal_cloud_v18",
            "product": {
              "name": "tia_portal_cloud_v18",
              "product_id": "CSAFPID-1712829",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-74798",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:15.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-75533",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:16:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-74794",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:17:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-74792",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal",
            "product": {
              "name": "totally_integrated_automation_portal",
              "product_id": "CSAFPID-1472073",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:19:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v15.1",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v15.1",
              "product_id": "CSAFPID-1615531",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v15.1",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v15.1",
              "product_id": "CSAFPID-1458014",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v16",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v16",
              "product_id": "CSAFPID-1615256",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v16",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v16",
              "product_id": "CSAFPID-1458015",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v17",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v17",
              "product_id": "CSAFPID-1615257",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v17",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v17",
              "product_id": "CSAFPID-1458016",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v18",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v18",
              "product_id": "CSAFPID-1615258",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v18",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v18",
              "product_id": "CSAFPID-1458017",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v19",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v19",
              "product_id": "CSAFPID-1637618",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "totally_integrated_automation_portal__tia_portal__v19",
            "product": {
              "name": "totally_integrated_automation_portal__tia_portal__v19",
              "product_id": "CSAFPID-1470073",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "wincc",
            "product": {
              "name": "wincc",
              "product_id": "CSAFPID-1625343",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "wincc_tia_portal",
            "product": {
              "name": "wincc_tia_portal",
              "product_id": "CSAFPID-465667",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:siemens:wincc_tia_portal:11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500",
            "product": {
              "name": "simatic_s7-1500",
              "product_id": "CSAFPID-715650",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7",
            "product": {
              "name": "simatic_s7",
              "product_id": "CSAFPID-1613729",
              "product_identification_helper": {
                "cpe": "cpe:2.3:h:siemens:simatic_s7:1500:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
            "product": {
              "name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
              "product_id": "CSAFPID-1691401",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn\\/dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "cpu_1518f-4_pn__dp_mfp_firmware",
            "product": {
              "name": "cpu_1518f-4_pn__dp_mfp_firmware",
              "product_id": "CSAFPID-715649",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn__dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_ape1808",
            "product": {
              "name": "ruggedcom_ape1808",
              "product_id": "CSAFPID-880853",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "ruggedcom_ape1808_firmware",
            "product": {
              "name": "ruggedcom_ape1808_firmware",
              "product_id": "CSAFPID-542833",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "security_configuration_tool",
            "product": {
              "name": "security_configuration_tool",
              "product_id": "CSAFPID-540747",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siemens_simatic_s7-1500_tm_mfp",
            "product": {
              "name": "siemens_simatic_s7-1500_tm_mfp",
              "product_id": "CSAFPID-1693048",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:siemens_simatic_s7-1500_tm_mfp:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siemens_simatic_s7_-1500_tm_mfp",
            "product": {
              "name": "siemens_simatic_s7_-1500_tm_mfp",
              "product_id": "CSAFPID-907212",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:siemens_simatic_s7_-1500_tm_mfp:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "siemens_telecontrol_server_basic",
            "product": {
              "name": "siemens_telecontrol_server_basic",
              "product_id": "CSAFPID-907211",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:siemens_telecontrol_server_basic:3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_mv500_firmware",
            "product": {
              "name": "simatic_mv500_firmware",
              "product_id": "CSAFPID-1692274",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_mv500_firmware:3.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_net_pc_software",
            "product": {
              "name": "simatic_net_pc_software",
              "product_id": "CSAFPID-1472070",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_net_pc_software:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_pcs_7",
            "product": {
              "name": "simatic_pcs_7",
              "product_id": "CSAFPID-1472067",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_pcs_7:9.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
            "product": {
              "name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
              "product_id": "CSAFPID-1689769",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
            "product": {
              "name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
              "product_id": "CSAFPID-766929",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_tm_mfp_firmware",
            "product": {
              "name": "simatic_s7-1500_tm_mfp_firmware",
              "product_id": "CSAFPID-717239",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_s7-1500_tm_mfp_firmware",
            "product": {
              "name": "simatic_s7-1500_tm_mfp_firmware",
              "product_id": "CSAFPID-905869",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_step_7",
            "product": {
              "name": "simatic_step_7",
              "product_id": "CSAFPID-879652",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_step_7:5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-1472068",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-1472066",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc",
            "product": {
              "name": "simatic_wincc",
              "product_id": "CSAFPID-1472072",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc:8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_oa",
            "product": {
              "name": "simatic_wincc_oa",
              "product_id": "CSAFPID-1472071",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_oa:3.17:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_advanced",
            "product": {
              "name": "simatic_wincc_runtime_advanced",
              "product_id": "CSAFPID-886176",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-165976",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:16:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-165974",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:17:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-855582",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:18:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "simatic_wincc_runtime_professional",
            "product": {
              "name": "simatic_wincc_runtime_professional",
              "product_id": "CSAFPID-855580",
              "product_identification_helper": {
                "cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:19:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-3506",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-3506",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3506.json"
        }
      ],
      "title": "CVE-2021-3506"
    },
    {
      "cve": "CVE-2023-2975",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Authentication",
          "title": "CWE-287"
        },
        {
          "category": "other",
          "text": "Improper Validation of Integrity Check Value",
          "title": "CWE-354"
        },
        {
          "category": "other",
          "text": "Use of a Broken or Risky Cryptographic Algorithm",
          "title": "CWE-327"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1703073",
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-2975",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2975.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1703073",
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-3341",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3341",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3341.json"
        }
      ],
      "title": "CVE-2023-3341"
    },
    {
      "cve": "CVE-2023-3446",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        },
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        },
        {
          "category": "other",
          "text": "Use of a Cryptographic Primitive with a Risky Implementation",
          "title": "CWE-1240"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703073",
          "CSAFPID-309392",
          "CSAFPID-1637855",
          "CSAFPID-1703131",
          "CSAFPID-1703173"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3446",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703073",
            "CSAFPID-309392",
            "CSAFPID-1637855",
            "CSAFPID-1703131",
            "CSAFPID-1703173"
          ]
        }
      ],
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-3817",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        },
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        },
        {
          "category": "other",
          "text": "Use of a Cryptographic Primitive with a Risky Implementation",
          "title": "CWE-1240"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1613729",
          "CSAFPID-1703073",
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3817",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1613729",
            "CSAFPID-1703073",
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4236",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4236",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4236.json"
        }
      ],
      "title": "CVE-2023-4236"
    },
    {
      "cve": "CVE-2023-4408",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4408",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
        }
      ],
      "title": "CVE-2023-4408"
    },
    {
      "cve": "CVE-2023-4807",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Expected Behavior Violation",
          "title": "CWE-440"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1637855",
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4807",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4807.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1637855",
            "CSAFPID-1703180",
            "CSAFPID-1703181",
            "CSAFPID-1703182",
            "CSAFPID-1703183",
            "CSAFPID-1703184",
            "CSAFPID-1703185",
            "CSAFPID-1703186"
          ]
        }
      ],
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-5363",
      "cwe": {
        "id": "CWE-325",
        "name": "Missing Cryptographic Step"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Cryptographic Step",
          "title": "CWE-325"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Incorrect Provision of Specified Functionality",
          "title": "CWE-684"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5363",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5363.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1703180",
            "CSAFPID-1703181",
            "CSAFPID-1703182",
            "CSAFPID-1703183",
            "CSAFPID-1703184",
            "CSAFPID-1703185",
            "CSAFPID-1703186"
          ]
        }
      ],
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2023-5517",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5517",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5517.json"
        }
      ],
      "title": "CVE-2023-5517"
    },
    {
      "cve": "CVE-2023-5678",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        },
        {
          "category": "other",
          "text": "Missing Cryptographic Step",
          "title": "CWE-325"
        },
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1613729",
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1637855",
          "CSAFPID-1703131",
          "CSAFPID-309392",
          "CSAFPID-1703173",
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5678",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
        }
      ],
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5679",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5679",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5679.json"
        }
      ],
      "title": "CVE-2023-5679"
    },
    {
      "cve": "CVE-2023-5680",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5680",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5680.json"
        }
      ],
      "title": "CVE-2023-5680"
    },
    {
      "cve": "CVE-2023-6129",
      "cwe": {
        "id": "CWE-328",
        "name": "Use of Weak Hash"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Weak Hash",
          "title": "CWE-328"
        },
        {
          "category": "other",
          "text": "Expected Behavior Violation",
          "title": "CWE-440"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "other",
          "text": "Use of a Broken or Risky Cryptographic Algorithm",
          "title": "CWE-327"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6129",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json"
        }
      ],
      "title": "CVE-2023-6129"
    },
    {
      "cve": "CVE-2023-6237",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6237",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6237.json"
        }
      ],
      "title": "CVE-2023-6237"
    },
    {
      "cve": "CVE-2023-6516",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Memory Allocation with Excessive Size Value",
          "title": "CWE-789"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6516",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6516.json"
        }
      ],
      "title": "CVE-2023-6516"
    },
    {
      "cve": "CVE-2023-7104",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-7104",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7104.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2023-7104"
    },
    {
      "cve": "CVE-2023-28450",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1613504",
          "CSAFPID-1613505",
          "CSAFPID-1613506",
          "CSAFPID-1613507",
          "CSAFPID-1613592",
          "CSAFPID-1613593",
          "CSAFPID-1613594",
          "CSAFPID-1613595",
          "CSAFPID-1613596",
          "CSAFPID-1613597",
          "CSAFPID-1613598"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-28450",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28450.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1613504",
            "CSAFPID-1613505",
            "CSAFPID-1613506",
            "CSAFPID-1613507",
            "CSAFPID-1613592",
            "CSAFPID-1613593",
            "CSAFPID-1613594",
            "CSAFPID-1613595",
            "CSAFPID-1613596",
            "CSAFPID-1613597",
            "CSAFPID-1613598"
          ]
        }
      ],
      "title": "CVE-2023-28450"
    },
    {
      "cve": "CVE-2023-30584",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-30584",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-30584.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-30584"
    },
    {
      "cve": "CVE-2023-32002",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        },
        {
          "category": "other",
          "text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
          "title": "CWE-1268"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32002",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32002.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32002"
    },
    {
      "cve": "CVE-2023-32003",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32003",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32003.json"
        }
      ],
      "title": "CVE-2023-32003"
    },
    {
      "cve": "CVE-2023-32004",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32004",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32004.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32004"
    },
    {
      "cve": "CVE-2023-32005",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32005",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32005.json"
        }
      ],
      "title": "CVE-2023-32005"
    },
    {
      "cve": "CVE-2023-32006",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Exposure of Sensitive Information Due to Incompatible Policies",
          "title": "CWE-213"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32006",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32006.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32006"
    },
    {
      "cve": "CVE-2023-32558",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32558",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32558.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32558"
    },
    {
      "cve": "CVE-2023-32559",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32559",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32559.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2023-32559"
    },
    {
      "cve": "CVE-2023-32736",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712825",
          "CSAFPID-1712826",
          "CSAFPID-1703190",
          "CSAFPID-1703191",
          "CSAFPID-1500667",
          "CSAFPID-1703187",
          "CSAFPID-1703188",
          "CSAFPID-1703189",
          "CSAFPID-1703192",
          "CSAFPID-1703193",
          "CSAFPID-1703194",
          "CSAFPID-1702687",
          "CSAFPID-1702688",
          "CSAFPID-1703195",
          "CSAFPID-1702694",
          "CSAFPID-1703196",
          "CSAFPID-1703197",
          "CSAFPID-1703198",
          "CSAFPID-1703199",
          "CSAFPID-1703200",
          "CSAFPID-1703201",
          "CSAFPID-1703202",
          "CSAFPID-1703203",
          "CSAFPID-1703204",
          "CSAFPID-1703205",
          "CSAFPID-1703206",
          "CSAFPID-1703207",
          "CSAFPID-1712827",
          "CSAFPID-1712828",
          "CSAFPID-1712829"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-32736",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32736.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712825",
            "CSAFPID-1712826",
            "CSAFPID-1703190",
            "CSAFPID-1703191",
            "CSAFPID-1500667",
            "CSAFPID-1703187",
            "CSAFPID-1703188",
            "CSAFPID-1703189",
            "CSAFPID-1703192",
            "CSAFPID-1703193",
            "CSAFPID-1703194",
            "CSAFPID-1702687",
            "CSAFPID-1702688",
            "CSAFPID-1703195",
            "CSAFPID-1702694",
            "CSAFPID-1703196",
            "CSAFPID-1703197",
            "CSAFPID-1703198",
            "CSAFPID-1703199",
            "CSAFPID-1703200",
            "CSAFPID-1703201",
            "CSAFPID-1703202",
            "CSAFPID-1703203",
            "CSAFPID-1703204",
            "CSAFPID-1703205",
            "CSAFPID-1703206",
            "CSAFPID-1703207",
            "CSAFPID-1712827",
            "CSAFPID-1712828",
            "CSAFPID-1712829"
          ]
        }
      ],
      "title": "CVE-2023-32736"
    },
    {
      "cve": "CVE-2023-38552",
      "cwe": {
        "id": "CWE-354",
        "name": "Improper Validation of Integrity Check Value"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Integrity Check Value",
          "title": "CWE-354"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38552",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38552.json"
        }
      ],
      "title": "CVE-2023-38552"
    },
    {
      "cve": "CVE-2023-38709",
      "cwe": {
        "id": "CWE-113",
        "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
          "title": "CWE-113"
        },
        {
          "category": "other",
          "text": "Improper Validation of Specified Quantity in Input",
          "title": "CWE-1284"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38709",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json"
        }
      ],
      "title": "CVE-2023-38709"
    },
    {
      "cve": "CVE-2023-39331",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-39331",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39331.json"
        }
      ],
      "title": "CVE-2023-39331"
    },
    {
      "cve": "CVE-2023-39332",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-39332",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39332.json"
        }
      ],
      "title": "CVE-2023-39332"
    },
    {
      "cve": "CVE-2023-39333",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-39333",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39333.json"
        }
      ],
      "title": "CVE-2023-39333"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-309392",
          "CSAFPID-1615259",
          "CSAFPID-1703173"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-44487",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-309392",
            "CSAFPID-1615259",
            "CSAFPID-1703173"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-45143",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-45143",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45143.json"
        }
      ],
      "title": "CVE-2023-45143"
    },
    {
      "cve": "CVE-2023-46218",
      "cwe": {
        "id": "CWE-201",
        "name": "Insertion of Sensitive Information Into Sent Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insertion of Sensitive Information Into Sent Data",
          "title": "CWE-201"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46218",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703180",
            "CSAFPID-1703181",
            "CSAFPID-1703182",
            "CSAFPID-1703183",
            "CSAFPID-1703184",
            "CSAFPID-1703185",
            "CSAFPID-1703186"
          ]
        }
      ],
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703180",
          "CSAFPID-1703181",
          "CSAFPID-1703182",
          "CSAFPID-1703183",
          "CSAFPID-1703184",
          "CSAFPID-1703185",
          "CSAFPID-1703186"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46219",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703180",
            "CSAFPID-1703181",
            "CSAFPID-1703182",
            "CSAFPID-1703183",
            "CSAFPID-1703184",
            "CSAFPID-1703185",
            "CSAFPID-1703186"
          ]
        }
      ],
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-46280",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1458012",
          "CSAFPID-309392",
          "CSAFPID-1625338",
          "CSAFPID-1625340",
          "CSAFPID-1625341",
          "CSAFPID-75563",
          "CSAFPID-1625342",
          "CSAFPID-165765",
          "CSAFPID-1625345",
          "CSAFPID-766087",
          "CSAFPID-1637559",
          "CSAFPID-1637560",
          "CSAFPID-1637561",
          "CSAFPID-1637909",
          "CSAFPID-1637910",
          "CSAFPID-1637849",
          "CSAFPID-1637850",
          "CSAFPID-1637851",
          "CSAFPID-1637911",
          "CSAFPID-1501190",
          "CSAFPID-1637912",
          "CSAFPID-1637856",
          "CSAFPID-1637913",
          "CSAFPID-1637914",
          "CSAFPID-1637915",
          "CSAFPID-1637916",
          "CSAFPID-1637917",
          "CSAFPID-1637887",
          "CSAFPID-1501188",
          "CSAFPID-1501192",
          "CSAFPID-1637854",
          "CSAFPID-1501193",
          "CSAFPID-1501191",
          "CSAFPID-1501189",
          "CSAFPID-1615531",
          "CSAFPID-1615256",
          "CSAFPID-1615257",
          "CSAFPID-1615258",
          "CSAFPID-1637618",
          "CSAFPID-1470060",
          "CSAFPID-1470061",
          "CSAFPID-1470062",
          "CSAFPID-1470063",
          "CSAFPID-1470064",
          "CSAFPID-1457909",
          "CSAFPID-1470065",
          "CSAFPID-1470066",
          "CSAFPID-1457855",
          "CSAFPID-1457956",
          "CSAFPID-1457957",
          "CSAFPID-1457958",
          "CSAFPID-1470067",
          "CSAFPID-1457960",
          "CSAFPID-1457961",
          "CSAFPID-1457962",
          "CSAFPID-1457963",
          "CSAFPID-1470068",
          "CSAFPID-1457965",
          "CSAFPID-1457966",
          "CSAFPID-1457967",
          "CSAFPID-1470069",
          "CSAFPID-1470070",
          "CSAFPID-1470071",
          "CSAFPID-1470072",
          "CSAFPID-1458014",
          "CSAFPID-1458015",
          "CSAFPID-1458016",
          "CSAFPID-1458017",
          "CSAFPID-1470073",
          "CSAFPID-75533",
          "CSAFPID-1472069",
          "CSAFPID-1472073",
          "CSAFPID-74792",
          "CSAFPID-74794",
          "CSAFPID-1457906",
          "CSAFPID-1457907",
          "CSAFPID-1457908"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46280",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46280.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1458012",
            "CSAFPID-309392",
            "CSAFPID-1625338",
            "CSAFPID-1625340",
            "CSAFPID-1625341",
            "CSAFPID-75563",
            "CSAFPID-1625342",
            "CSAFPID-165765",
            "CSAFPID-1625345",
            "CSAFPID-766087",
            "CSAFPID-1637559",
            "CSAFPID-1637560",
            "CSAFPID-1637561",
            "CSAFPID-1637909",
            "CSAFPID-1637910",
            "CSAFPID-1637849",
            "CSAFPID-1637850",
            "CSAFPID-1637851",
            "CSAFPID-1637911",
            "CSAFPID-1501190",
            "CSAFPID-1637912",
            "CSAFPID-1637856",
            "CSAFPID-1637913",
            "CSAFPID-1637914",
            "CSAFPID-1637915",
            "CSAFPID-1637916",
            "CSAFPID-1637917",
            "CSAFPID-1637887",
            "CSAFPID-1501188",
            "CSAFPID-1501192",
            "CSAFPID-1637854",
            "CSAFPID-1501193",
            "CSAFPID-1501191",
            "CSAFPID-1501189",
            "CSAFPID-1615531",
            "CSAFPID-1615256",
            "CSAFPID-1615257",
            "CSAFPID-1615258",
            "CSAFPID-1637618",
            "CSAFPID-1470060",
            "CSAFPID-1470061",
            "CSAFPID-1470062",
            "CSAFPID-1470063",
            "CSAFPID-1470064",
            "CSAFPID-1457909",
            "CSAFPID-1470065",
            "CSAFPID-1470066",
            "CSAFPID-1457855",
            "CSAFPID-1457956",
            "CSAFPID-1457957",
            "CSAFPID-1457958",
            "CSAFPID-1470067",
            "CSAFPID-1457960",
            "CSAFPID-1457961",
            "CSAFPID-1457962",
            "CSAFPID-1457963",
            "CSAFPID-1470068",
            "CSAFPID-1457965",
            "CSAFPID-1457966",
            "CSAFPID-1457967",
            "CSAFPID-1470069",
            "CSAFPID-1470070",
            "CSAFPID-1470071",
            "CSAFPID-1470072",
            "CSAFPID-1458014",
            "CSAFPID-1458015",
            "CSAFPID-1458016",
            "CSAFPID-1458017",
            "CSAFPID-1470073",
            "CSAFPID-75533",
            "CSAFPID-1472069",
            "CSAFPID-1472073",
            "CSAFPID-74792",
            "CSAFPID-74794",
            "CSAFPID-1457906",
            "CSAFPID-1457907",
            "CSAFPID-1457908"
          ]
        }
      ],
      "title": "CVE-2023-46280"
    },
    {
      "cve": "CVE-2023-46809",
      "cwe": {
        "id": "CWE-208",
        "name": "Observable Timing Discrepancy"
      },
      "notes": [
        {
          "category": "other",
          "text": "Observable Timing Discrepancy",
          "title": "CWE-208"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46809",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46809.json"
        }
      ],
      "title": "CVE-2023-46809"
    },
    {
      "cve": "CVE-2023-47038",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-47038",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47038.json"
        }
      ],
      "title": "CVE-2023-47038"
    },
    {
      "cve": "CVE-2023-47039",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-47039",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47039.json"
        }
      ],
      "title": "CVE-2023-47039"
    },
    {
      "cve": "CVE-2023-47100",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-47100",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47100.json"
        }
      ],
      "title": "CVE-2023-47100"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Truncation of Security-relevant Information",
          "title": "CWE-222"
        },
        {
          "category": "other",
          "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
          "title": "CWE-757"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615259",
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-48795",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615259",
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-49441",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-49441",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49441.json"
        }
      ],
      "title": "CVE-2023-49441"
    },
    {
      "cve": "CVE-2023-50387",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-50387",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50387.json"
        }
      ],
      "title": "CVE-2023-50387"
    },
    {
      "cve": "CVE-2023-50868",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-50868",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
        }
      ],
      "title": "CVE-2023-50868"
    },
    {
      "cve": "CVE-2023-52389",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-52389",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52389.json"
        }
      ],
      "title": "CVE-2023-52389"
    },
    {
      "cve": "CVE-2024-0232",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0232",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
        }
      ],
      "title": "CVE-2024-0232"
    },
    {
      "cve": "CVE-2024-0727",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1613729",
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0727",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1613729",
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-2004",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Cleartext Transmission of Sensitive Information",
          "title": "CWE-319"
        },
        {
          "category": "other",
          "text": "Misinterpretation of Input",
          "title": "CWE-115"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Interpretation Conflict",
          "title": "CWE-436"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-894438"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2004",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-894438"
          ]
        }
      ],
      "title": "CVE-2024-2004"
    },
    {
      "cve": "CVE-2024-2379",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Certificate Validation",
          "title": "CWE-295"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-894438"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2379",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2379.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-894438"
          ]
        }
      ],
      "title": "CVE-2024-2379"
    },
    {
      "cve": "CVE-2024-2398",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        },
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-894438"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2398",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-894438"
          ]
        }
      ],
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-2466",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Certificate Validation",
          "title": "CWE-295"
        },
        {
          "category": "other",
          "text": "Improper Validation of Certificate with Host Mismatch",
          "title": "CWE-297"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-894438"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2466",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-894438"
          ]
        }
      ],
      "title": "CVE-2024-2466"
    },
    {
      "cve": "CVE-2024-2511",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improperly Controlled Sequential Memory Allocation",
          "title": "CWE-1325"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2511",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2024-2511"
    },
    {
      "cve": "CVE-2024-4603",
      "cwe": {
        "id": "CWE-606",
        "name": "Unchecked Input for Loop Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        },
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4603",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
        }
      ],
      "title": "CVE-2024-4603"
    },
    {
      "cve": "CVE-2024-4741",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4741",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
        }
      ],
      "title": "CVE-2024-4741"
    },
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1615260",
          "CSAFPID-1615261",
          "CSAFPID-1615262",
          "CSAFPID-1615263",
          "CSAFPID-1615264",
          "CSAFPID-1703131"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5535",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1615260",
            "CSAFPID-1615261",
            "CSAFPID-1615262",
            "CSAFPID-1615263",
            "CSAFPID-1615264",
            "CSAFPID-1703131"
          ]
        }
      ],
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-5594",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5594",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5594.json"
        }
      ],
      "title": "CVE-2024-5594"
    },
    {
      "cve": "CVE-2024-21890",
      "cwe": {
        "id": "CWE-275",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-275",
          "title": "CWE-275"
        },
        {
          "category": "other",
          "text": "Insufficient Technical Documentation",
          "title": "CWE-1059"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21890",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21890.json"
        }
      ],
      "title": "CVE-2024-21890"
    },
    {
      "cve": "CVE-2024-21891",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21891.json"
        }
      ],
      "title": "CVE-2024-21891"
    },
    {
      "cve": "CVE-2024-21892",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21892",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21892.json"
        }
      ],
      "title": "CVE-2024-21892"
    },
    {
      "cve": "CVE-2024-21896",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21896",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21896.json"
        }
      ],
      "title": "CVE-2024-21896"
    },
    {
      "cve": "CVE-2024-22017",
      "cwe": {
        "id": "CWE-271",
        "name": "Privilege Dropping / Lowering Errors"
      },
      "notes": [
        {
          "category": "other",
          "text": "Privilege Dropping / Lowering Errors",
          "title": "CWE-271"
        },
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22017",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22017.json"
        }
      ],
      "title": "CVE-2024-22017"
    },
    {
      "cve": "CVE-2024-22019",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22019",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json"
        }
      ],
      "title": "CVE-2024-22019"
    },
    {
      "cve": "CVE-2024-22025",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22025",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22025.json"
        }
      ],
      "title": "CVE-2024-22025"
    },
    {
      "cve": "CVE-2024-24758",
      "cwe": {
        "id": "CWE-942",
        "name": "Permissive Cross-domain Policy with Untrusted Domains"
      },
      "notes": [
        {
          "category": "other",
          "text": "Permissive Cross-domain Policy with Untrusted Domains",
          "title": "CWE-942"
        },
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24758",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24758.json"
        }
      ],
      "title": "CVE-2024-24758"
    },
    {
      "cve": "CVE-2024-24795",
      "cwe": {
        "id": "CWE-113",
        "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
          "title": "CWE-113"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24795",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24795.json"
        }
      ],
      "title": "CVE-2024-24795"
    },
    {
      "cve": "CVE-2024-24806",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24806",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24806.json"
        }
      ],
      "title": "CVE-2024-24806"
    },
    {
      "cve": "CVE-2024-26306",
      "cwe": {
        "id": "CWE-310",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-310",
          "title": "CWE-310"
        },
        {
          "category": "other",
          "text": "Observable Discrepancy",
          "title": "CWE-203"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26306",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26306.json"
        }
      ],
      "title": "CVE-2024-26306"
    },
    {
      "cve": "CVE-2024-26925",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Improper Locking",
          "title": "CWE-667"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26925",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26925.json"
        }
      ],
      "title": "CVE-2024-26925"
    },
    {
      "cve": "CVE-2024-27316",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-27316",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json"
        }
      ],
      "title": "CVE-2024-27316"
    },
    {
      "cve": "CVE-2024-27980",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-27980",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27980.json"
        }
      ],
      "title": "CVE-2024-27980"
    },
    {
      "cve": "CVE-2024-27982",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-27982",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27982.json"
        }
      ],
      "title": "CVE-2024-27982"
    },
    {
      "cve": "CVE-2024-27983",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-27983",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
        }
      ],
      "title": "CVE-2024-27983"
    },
    {
      "cve": "CVE-2024-28882",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28882",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28882.json"
        }
      ],
      "title": "CVE-2024-28882"
    },
    {
      "cve": "CVE-2024-29119",
      "cwe": {
        "id": "CWE-266",
        "name": "Incorrect Privilege Assignment"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Privilege Assignment",
          "title": "CWE-266"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-524281"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29119",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29119.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-524281"
          ]
        }
      ],
      "title": "CVE-2024-29119"
    },
    {
      "cve": "CVE-2024-36140",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712832",
          "CSAFPID-1712833"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-36140",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36140.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712832",
            "CSAFPID-1712833"
          ]
        }
      ],
      "title": "CVE-2024-36140"
    },
    {
      "cve": "CVE-2024-44102",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712834",
          "CSAFPID-1712835",
          "CSAFPID-1712836",
          "CSAFPID-1712837",
          "CSAFPID-1712838",
          "CSAFPID-1712839",
          "CSAFPID-1712840",
          "CSAFPID-1712841",
          "CSAFPID-1712842",
          "CSAFPID-1712843",
          "CSAFPID-1712844",
          "CSAFPID-1712845",
          "CSAFPID-1712846"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-44102",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44102.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712834",
            "CSAFPID-1712835",
            "CSAFPID-1712836",
            "CSAFPID-1712837",
            "CSAFPID-1712838",
            "CSAFPID-1712839",
            "CSAFPID-1712840",
            "CSAFPID-1712841",
            "CSAFPID-1712842",
            "CSAFPID-1712843",
            "CSAFPID-1712844",
            "CSAFPID-1712845",
            "CSAFPID-1712846"
          ]
        }
      ],
      "title": "CVE-2024-44102"
    },
    {
      "cve": "CVE-2024-46888",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46888",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46888.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46888"
    },
    {
      "cve": "CVE-2024-46889",
      "cwe": {
        "id": "CWE-321",
        "name": "Use of Hard-coded Cryptographic Key"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Hard-coded Cryptographic Key",
          "title": "CWE-321"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46889",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46889.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46889"
    },
    {
      "cve": "CVE-2024-46890",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46890",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46890.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46890"
    },
    {
      "cve": "CVE-2024-46891",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46891.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46891"
    },
    {
      "cve": "CVE-2024-46892",
      "cwe": {
        "id": "CWE-613",
        "name": "Insufficient Session Expiration"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Session Expiration",
          "title": "CWE-613"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46892",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46892.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46892"
    },
    {
      "cve": "CVE-2024-46894",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-746925"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-46894",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46894.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-746925"
          ]
        }
      ],
      "title": "CVE-2024-46894"
    },
    {
      "cve": "CVE-2024-47783",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712847"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47783",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47783.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712847"
          ]
        }
      ],
      "title": "CVE-2024-47783"
    },
    {
      "cve": "CVE-2024-47808",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-309392"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47808",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47808.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-309392"
          ]
        }
      ],
      "title": "CVE-2024-47808"
    },
    {
      "cve": "CVE-2024-47940",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1680248"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47940",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47940.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1680248"
          ]
        }
      ],
      "title": "CVE-2024-47940"
    },
    {
      "cve": "CVE-2024-47941",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1680248"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47941",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47941.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1680248"
          ]
        }
      ],
      "title": "CVE-2024-47941"
    },
    {
      "cve": "CVE-2024-47942",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Search Path Element",
          "title": "CWE-427"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1680248"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47942",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47942.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1680248"
          ]
        }
      ],
      "title": "CVE-2024-47942"
    },
    {
      "cve": "CVE-2024-50310",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1712748"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50310",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50310.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1712748"
          ]
        }
      ],
      "title": "CVE-2024-50310"
    },
    {
      "cve": "CVE-2024-50313",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1637622",
          "CSAFPID-1637623",
          "CSAFPID-1637624",
          "CSAFPID-1637625",
          "CSAFPID-1637626"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50313",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50313.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1637622",
            "CSAFPID-1637623",
            "CSAFPID-1637624",
            "CSAFPID-1637625",
            "CSAFPID-1637626"
          ]
        }
      ],
      "title": "CVE-2024-50313"
    },
    {
      "cve": "CVE-2024-50557",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50557",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50557.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50557"
    },
    {
      "cve": "CVE-2024-50558",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50558",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50558.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50558"
    },
    {
      "cve": "CVE-2024-50559",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50559",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50559.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50559"
    },
    {
      "cve": "CVE-2024-50560",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50560",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50560.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50560"
    },
    {
      "cve": "CVE-2024-50561",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50561",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50561.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50561"
    },
    {
      "cve": "CVE-2024-50572",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
          "title": "CWE-74"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1702670",
          "CSAFPID-1702671",
          "CSAFPID-1702672",
          "CSAFPID-1712749",
          "CSAFPID-1712750",
          "CSAFPID-1702677",
          "CSAFPID-1702678",
          "CSAFPID-1702679",
          "CSAFPID-1712751",
          "CSAFPID-1712752",
          "CSAFPID-1702681",
          "CSAFPID-1712753",
          "CSAFPID-1702682",
          "CSAFPID-1702683",
          "CSAFPID-1712754",
          "CSAFPID-1712755",
          "CSAFPID-1712756",
          "CSAFPID-1712757",
          "CSAFPID-1712758",
          "CSAFPID-1712759",
          "CSAFPID-1702684",
          "CSAFPID-1702685",
          "CSAFPID-1712760",
          "CSAFPID-1712761"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50572",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50572.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1702670",
            "CSAFPID-1702671",
            "CSAFPID-1702672",
            "CSAFPID-1712749",
            "CSAFPID-1712750",
            "CSAFPID-1702677",
            "CSAFPID-1702678",
            "CSAFPID-1702679",
            "CSAFPID-1712751",
            "CSAFPID-1712752",
            "CSAFPID-1702681",
            "CSAFPID-1712753",
            "CSAFPID-1702682",
            "CSAFPID-1702683",
            "CSAFPID-1712754",
            "CSAFPID-1712755",
            "CSAFPID-1712756",
            "CSAFPID-1712757",
            "CSAFPID-1712758",
            "CSAFPID-1712759",
            "CSAFPID-1702684",
            "CSAFPID-1702685",
            "CSAFPID-1712760",
            "CSAFPID-1712761"
          ]
        }
      ],
      "title": "CVE-2024-50572"
    }
  ]
}
  var-202411-0737
Vulnerability from variot
A vulnerability has been identified in OZW672 (All versions < V5.2), OZW772 (All versions < V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.
This could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker. Siemens' OZW672 firmware and OZW772 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. OZW devices (web servers) are used to remotely monitor building controller devices, such as heating controls or air conditioning.
Siemens OZW devices (web servers) have a cross-site scripting vulnerability that can be exploited by attackers to inject arbitrary JavaScript code
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202411-0737",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ozw672",
        "scope": "lt",
        "trust": 1.6,
        "vendor": "siemens",
        "version": "5.2"
      },
      {
        "model": "ozw772",
        "scope": "lt",
        "trust": 1.6,
        "vendor": "siemens",
        "version": "5.2"
      },
      {
        "model": "ozw772",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      },
      {
        "model": "ozw672",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-36140"
      }
    ]
  },
  "cve": "CVE-2024-36140",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2024-45220",
            "impactScore": 6.9,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.3,
            "id": "CVE-2024-36140",
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "productcert@siemens.com",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.3,
            "id": "CVE-2024-36140",
            "impactScore": 4.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.4,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2024-36140",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2024-36140",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "productcert@siemens.com",
            "id": "CVE-2024-36140",
            "trust": 1.0,
            "value": "High"
          },
          {
            "author": "NVD",
            "id": "CVE-2024-36140",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2024-45220",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-36140"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-36140"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks. \r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker. Siemens\u0027 OZW672 firmware and OZW772 Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. OZW devices (web servers) are used to remotely monitor building controller devices, such as heating controls or air conditioning. \n\nSiemens OZW devices (web servers) have a cross-site scripting vulnerability that can be exploited by attackers to inject arbitrary JavaScript code",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-36140"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-36140",
        "trust": 3.2
      },
      {
        "db": "SIEMENS",
        "id": "SSA-230445",
        "trust": 2.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-24-319-03",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU96191615",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-012845",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-36140"
      }
    ]
  },
  "id": "VAR-202411-0737",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      }
    ],
    "trust": 1.225
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      }
    ]
  },
  "last_update_date": "2024-11-28T20:10:13.609000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Patch for Siemens OZW devices (web servers) cross-site scripting vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/617291"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.0
      },
      {
        "problemtype": "Cross-site scripting (CWE-79) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-36140"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu96191615/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-36140"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-03"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-36140"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-36140"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-11-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      },
      {
        "date": "2024-11-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      },
      {
        "date": "2024-11-12T13:15:07.957000",
        "db": "NVD",
        "id": "CVE-2024-36140"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-11-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2024-45220"
      },
      {
        "date": "2024-11-18T04:46:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      },
      {
        "date": "2024-11-15T22:53:26.063000",
        "db": "NVD",
        "id": "CVE-2024-36140"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Siemens\u0027 \u00a0OZW672\u00a0 firmware and \u00a0OZW772\u00a0 Cross-site scripting vulnerability in firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-012845"
      }
    ],
    "trust": 0.8
  }
}
  cnvd-2024-45220
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://support.industry.siemens.com/cs/ww/en/view/62567396/ https://support.industry.siemens.com/cs/ww/en/view/62564534/
| Name | ['Siemens OZW672 <5.2', 'Siemens OZW772 <5.2'] | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2024-36140"
    }
  },
  "description": "OZW devices (web servers) \u662f\u7528\u4e8e\u8fdc\u7a0b\u76d1\u63a7\u5efa\u7b51\u63a7\u5236\u5668\u8bbe\u5907\uff0c\u4f8b\u5982\u7528\u4e8e\u76d1\u63a7\u4f9b\u6696\u63a7\u5236\u6216\u7a7a\u8c03\u3002\n\nSiemens OZW devices (web servers) \u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610fJavaScript\u4ee3\u7801\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.industry.siemens.com/cs/ww/en/view/62567396/\r\nhttps://support.industry.siemens.com/cs/ww/en/view/62564534/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2024-45220",
  "openTime": "2024-11-18",
  "patchDescription": "OZW devices (web servers) \u662f\u7528\u4e8e\u8fdc\u7a0b\u76d1\u63a7\u5efa\u7b51\u63a7\u5236\u5668\u8bbe\u5907\uff0c\u4f8b\u5982\u7528\u4e8e\u76d1\u63a7\u4f9b\u6696\u63a7\u5236\u6216\u7a7a\u8c03\u3002\r\n\r\nSiemens OZW devices (web servers) \u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610fJavaScript\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Siemens OZW devices (web servers) \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Siemens OZW672 \u003c5.2",
      "Siemens OZW772 \u003c5.2"
    ]
  },
  "referenceLink": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html",
  "serverity": "\u4e2d",
  "submitTime": "2024-11-13",
  "title": "Siemens OZW devices (web servers) \u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}
  SSA-230445
Vulnerability from csaf_siemens
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "OZW672 and OZW772 Web Server versions before V5.2 contain a stored cross-site scripting (XSS) vulnerability that could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html"
      },
      {
        "category": "self",
        "summary": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-230445.json"
      }
    ],
    "title": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2",
    "tracking": {
      "current_release_date": "2024-11-12T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-230445",
      "initial_release_date": "2024-11-12T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-11-12T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "interim",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cV5.2",
                "product": {
                  "name": "OZW672",
                  "product_id": "1"
                }
              }
            ],
            "category": "product_name",
            "name": "OZW672"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cV5.2",
                "product": {
                  "name": "OZW772",
                  "product_id": "2"
                }
              }
            ],
            "category": "product_name",
            "name": "OZW772"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-36140",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V5.2 or later version",
          "product_ids": [
            "1",
            "2"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2"
          ]
        }
      ],
      "title": "CVE-2024-36140"
    }
  ]
}
  ssa-230445
Vulnerability from csaf_siemens
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "OZW672 and OZW772 Web Server versions before V5.2 contain a stored cross-site scripting (XSS) vulnerability that could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html"
      },
      {
        "category": "self",
        "summary": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-230445.json"
      }
    ],
    "title": "SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2",
    "tracking": {
      "current_release_date": "2024-11-12T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-230445",
      "initial_release_date": "2024-11-12T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-11-12T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "interim",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cV5.2",
                "product": {
                  "name": "OZW672",
                  "product_id": "1"
                }
              }
            ],
            "category": "product_name",
            "name": "OZW672"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cV5.2",
                "product": {
                  "name": "OZW772",
                  "product_id": "2"
                }
              }
            ],
            "category": "product_name",
            "name": "OZW772"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-36140",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V5.2 or later version",
          "product_ids": [
            "1",
            "2"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2"
          ]
        }
      ],
      "title": "CVE-2024-36140"
    }
  ]
}
  ghsa-w95c-2q6h-h5mp
Vulnerability from github
8.2 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N
A vulnerability has been identified in OZW672 (All versions < V5.2), OZW772 (All versions < V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.
This could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.
{
  "affected": [],
  "aliases": [
    "CVE-2024-36140"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-79"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-11-12T13:15:07Z",
    "severity": "HIGH"
  },
  "details": "A vulnerability has been identified in OZW672 (All versions \u003c V5.2), OZW772 (All versions \u003c V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\n\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.",
  "id": "GHSA-w95c-2q6h-h5mp",
  "modified": "2024-11-12T15:30:41Z",
  "published": "2024-11-12T15:30:41Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36140"
    },
    {
      "type": "WEB",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
      "type": "CVSS_V3"
    },
    {
      "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
      "type": "CVSS_V4"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.