Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-49767 (GCVE-0-2024-49767)
Vulnerability from cvelistv5
{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "werkzeug",
            "vendor": "palletsprojects",
            "versions": [
              {
                "lessThan": "3.0.6",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-49767",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-25T20:06:53.070201Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-25T20:07:56.560Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-01-03T12:04:27.829Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://security.netapp.com/advisory/ntap-20250103-0007/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "werkzeug",
          "vendor": "pallets",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 3.0.6"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400: Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770: Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-27T21:01:51.234Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2"
        },
        {
          "name": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee"
        },
        {
          "name": "https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f"
        },
        {
          "name": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b"
        },
        {
          "name": "https://github.com/pallets/werkzeug/releases/tag/3.0.6",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/pallets/werkzeug/releases/tag/3.0.6"
        }
      ],
      "source": {
        "advisory": "GHSA-q34m-jh98-gwm2",
        "discovery": "UNKNOWN"
      },
      "title": "Werkzeug possible resource exhaustion when parsing file data in forms"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-49767",
    "datePublished": "2024-10-25T19:41:35.029Z",
    "dateReserved": "2024-10-18T13:43:23.457Z",
    "dateUpdated": "2025-01-03T12:04:27.829Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-49767\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-10-25T20:15:04.530\",\"lastModified\":\"2025-01-03T12:15:26.257\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.\"},{\"lang\":\"es\",\"value\":\"Werkzeug es una librer\u00eda de aplicaciones web de interfaz de puerta de enlace de servidor web. Las aplicaciones que utilizan `werkzeug.formparser.MultiPartParser` correspondiente a una versi\u00f3n de Werkzeug anterior a la 3.0.6 para analizar solicitudes `multipart/form-data` (por ejemplo, todas las aplicaciones Flask) son vulnerables a un ataque de agotamiento de recursos (denegaci\u00f3n de servicio) relativamente simple pero efectivo. Una solicitud de env\u00edo de formulario manipulada espec\u00edficamente puede hacer que el analizador asigne y bloquee de 3 a 8 veces el tama\u00f1o de carga en la memoria principal. No hay un l\u00edmite superior; una sola carga a 1 Gbit/s puede agotar 32 GB de RAM en menos de 60 segundos. La versi\u00f3n 3.0.6 de Werkzeug corrige este problema.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnerableSystemConfidentiality\":\"NONE\",\"vulnerableSystemIntegrity\":\"NONE\",\"vulnerableSystemAvailability\":\"LOW\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"NONE\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"},{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:palletsprojects:quart:*:*:*:*:*:python:*:*\",\"versionEndExcluding\":\"0.19.7\",\"matchCriteriaId\":\"9E539F20-B2D2-42F4-98D4-DB92AAB1741E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0.6\",\"matchCriteriaId\":\"50FE9673-B294-4203-9C8D-DEF5028AE799\"}]}]}],\"references\":[{\"url\":\"https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/pallets/werkzeug/releases/tag/3.0.6\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250103-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250103-0007/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-03T12:04:27.829Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-49767\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-25T20:06:53.070201Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*\"], \"vendor\": \"palletsprojects\", \"product\": \"werkzeug\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.0.6\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-25T20:07:46.576Z\"}}], \"cna\": {\"title\": \"Werkzeug possible resource exhaustion when parsing file data in forms\", \"source\": {\"advisory\": \"GHSA-q34m-jh98-gwm2\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 6.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"pallets\", \"product\": \"werkzeug\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 3.0.6\"}]}], \"references\": [{\"url\": \"https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2\", \"name\": \"https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee\", \"name\": \"https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f\", \"name\": \"https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b\", \"name\": \"https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/pallets/werkzeug/releases/tag/3.0.6\", \"name\": \"https://github.com/pallets/werkzeug/releases/tag/3.0.6\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770: Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-12-27T21:01:51.234Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-49767\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-03T12:04:27.829Z\", \"dateReserved\": \"2024-10-18T13:43:23.457Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-10-25T19:41:35.029Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  opensuse-su-2024:14437-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "python310-Werkzeug-3.0.6-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the python310-Werkzeug-3.0.6-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-14437",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14437-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2024:14437-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EEDORZ73SOELOS7TKJQAXXXUI3FKWH3Z/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2024:14437-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EEDORZ73SOELOS7TKJQAXXXUI3FKWH3Z/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49767 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49767/"
      }
    ],
    "title": "python310-Werkzeug-3.0.6-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-10-29T00:00:00Z",
      "generator": {
        "date": "2024-10-29T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:14437-1",
      "initial_release_date": "2024-10-29T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-10-29T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python310-Werkzeug-3.0.6-1.1.aarch64",
                "product": {
                  "name": "python310-Werkzeug-3.0.6-1.1.aarch64",
                  "product_id": "python310-Werkzeug-3.0.6-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python311-Werkzeug-3.0.6-1.1.aarch64",
                "product": {
                  "name": "python311-Werkzeug-3.0.6-1.1.aarch64",
                  "product_id": "python311-Werkzeug-3.0.6-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python312-Werkzeug-3.0.6-1.1.aarch64",
                "product": {
                  "name": "python312-Werkzeug-3.0.6-1.1.aarch64",
                  "product_id": "python312-Werkzeug-3.0.6-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python310-Werkzeug-3.0.6-1.1.ppc64le",
                "product": {
                  "name": "python310-Werkzeug-3.0.6-1.1.ppc64le",
                  "product_id": "python310-Werkzeug-3.0.6-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python311-Werkzeug-3.0.6-1.1.ppc64le",
                "product": {
                  "name": "python311-Werkzeug-3.0.6-1.1.ppc64le",
                  "product_id": "python311-Werkzeug-3.0.6-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python312-Werkzeug-3.0.6-1.1.ppc64le",
                "product": {
                  "name": "python312-Werkzeug-3.0.6-1.1.ppc64le",
                  "product_id": "python312-Werkzeug-3.0.6-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python310-Werkzeug-3.0.6-1.1.s390x",
                "product": {
                  "name": "python310-Werkzeug-3.0.6-1.1.s390x",
                  "product_id": "python310-Werkzeug-3.0.6-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python311-Werkzeug-3.0.6-1.1.s390x",
                "product": {
                  "name": "python311-Werkzeug-3.0.6-1.1.s390x",
                  "product_id": "python311-Werkzeug-3.0.6-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python312-Werkzeug-3.0.6-1.1.s390x",
                "product": {
                  "name": "python312-Werkzeug-3.0.6-1.1.s390x",
                  "product_id": "python312-Werkzeug-3.0.6-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python310-Werkzeug-3.0.6-1.1.x86_64",
                "product": {
                  "name": "python310-Werkzeug-3.0.6-1.1.x86_64",
                  "product_id": "python310-Werkzeug-3.0.6-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python311-Werkzeug-3.0.6-1.1.x86_64",
                "product": {
                  "name": "python311-Werkzeug-3.0.6-1.1.x86_64",
                  "product_id": "python311-Werkzeug-3.0.6-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python312-Werkzeug-3.0.6-1.1.x86_64",
                "product": {
                  "name": "python312-Werkzeug-3.0.6-1.1.x86_64",
                  "product_id": "python312-Werkzeug-3.0.6-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python310-Werkzeug-3.0.6-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.aarch64"
        },
        "product_reference": "python310-Werkzeug-3.0.6-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python310-Werkzeug-3.0.6-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.ppc64le"
        },
        "product_reference": "python310-Werkzeug-3.0.6-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python310-Werkzeug-3.0.6-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.s390x"
        },
        "product_reference": "python310-Werkzeug-3.0.6-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python310-Werkzeug-3.0.6-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.x86_64"
        },
        "product_reference": "python310-Werkzeug-3.0.6-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Werkzeug-3.0.6-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.aarch64"
        },
        "product_reference": "python311-Werkzeug-3.0.6-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Werkzeug-3.0.6-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.ppc64le"
        },
        "product_reference": "python311-Werkzeug-3.0.6-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Werkzeug-3.0.6-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.s390x"
        },
        "product_reference": "python311-Werkzeug-3.0.6-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Werkzeug-3.0.6-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.x86_64"
        },
        "product_reference": "python311-Werkzeug-3.0.6-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python312-Werkzeug-3.0.6-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.aarch64"
        },
        "product_reference": "python312-Werkzeug-3.0.6-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python312-Werkzeug-3.0.6-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.ppc64le"
        },
        "product_reference": "python312-Werkzeug-3.0.6-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python312-Werkzeug-3.0.6-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.s390x"
        },
        "product_reference": "python312-Werkzeug-3.0.6-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python312-Werkzeug-3.0.6-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.x86_64"
        },
        "product_reference": "python312-Werkzeug-3.0.6-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-49767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.aarch64",
          "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.ppc64le",
          "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.s390x",
          "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.x86_64",
          "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.aarch64",
          "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.ppc64le",
          "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.s390x",
          "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.x86_64",
          "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.aarch64",
          "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.ppc64le",
          "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.s390x",
          "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49767",
          "url": "https://www.suse.com/security/cve/CVE-2024-49767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232449 for CVE-2024-49767",
          "url": "https://bugzilla.suse.com/1232449"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.aarch64",
            "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.ppc64le",
            "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.s390x",
            "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.s390x",
            "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.x86_64",
            "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.aarch64",
            "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.ppc64le",
            "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.s390x",
            "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.aarch64",
            "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.ppc64le",
            "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.s390x",
            "openSUSE Tumbleweed:python310-Werkzeug-3.0.6-1.1.x86_64",
            "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.aarch64",
            "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.ppc64le",
            "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.s390x",
            "openSUSE Tumbleweed:python311-Werkzeug-3.0.6-1.1.x86_64",
            "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.aarch64",
            "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.ppc64le",
            "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.s390x",
            "openSUSE Tumbleweed:python312-Werkzeug-3.0.6-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-10-29T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-49767"
    }
  ]
}
  CERTFR-2025-AVI-0021
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Security QRadar EDR | Security QRadar EDR versions antérieures à 3.12.14 | ||
| IBM | Spectrum | Spectrum Control versions 5.4.x antérieures à 5.4.13 | ||
| IBM | Spectrum | Spectrum Protect Plus versions 10.1.x antérieures à 10.1.6.4 pour Linux | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x sans les derniers correctifs de sécurité | ||
| IBM | QRadar | QRadar Analyst Workflow versions antérieures à 2.34.0 | ||
| IBM | Db2 | Db2 Big SQL versions antérieures à 7.4.2 pour Cloud Pak for Data | 
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.14",
      "product": {
        "name": "Security QRadar EDR",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Spectrum Control versions 5.4.x ant\u00e9rieures \u00e0 5.4.13 ",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.6.4 pour Linux",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar SIEM versions 7.5.x sans les derniers correctifs de s\u00e9curit\u00e9 ",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Analyst Workflow versions ant\u00e9rieures \u00e0 2.34.0",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Db2 Big SQL versions ant\u00e9rieures \u00e0 7.4.2 pour Cloud Pak for Data",
      "product": {
        "name": "Db2",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2023-52471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52471"
    },
    {
      "name": "CVE-2024-36889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
    },
    {
      "name": "CVE-2015-2156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2156"
    },
    {
      "name": "CVE-2023-43642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
    },
    {
      "name": "CVE-2024-42246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
    },
    {
      "name": "CVE-2024-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
    },
    {
      "name": "CVE-2024-26614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
    },
    {
      "name": "CVE-2022-25869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25869"
    },
    {
      "name": "CVE-2024-9355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9355"
    },
    {
      "name": "CVE-2023-26116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26116"
    },
    {
      "name": "CVE-2024-26595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
    },
    {
      "name": "CVE-2024-55565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
    },
    {
      "name": "CVE-2024-26586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
    },
    {
      "name": "CVE-2024-26638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26638"
    },
    {
      "name": "CVE-2024-47831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47831"
    },
    {
      "name": "CVE-2020-7238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238"
    },
    {
      "name": "CVE-2021-46939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46939"
    },
    {
      "name": "CVE-2024-43799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2024-36886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
    },
    {
      "name": "CVE-2021-32036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32036"
    },
    {
      "name": "CVE-2024-26802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
    },
    {
      "name": "CVE-2024-36883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
    },
    {
      "name": "CVE-2024-26665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
    },
    {
      "name": "CVE-2024-40960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
    },
    {
      "name": "CVE-2024-40997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40997"
    },
    {
      "name": "CVE-2023-44270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
    },
    {
      "name": "CVE-2019-20444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444"
    },
    {
      "name": "CVE-2023-34454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
    },
    {
      "name": "CVE-2024-26645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
    },
    {
      "name": "CVE-2024-42240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
    },
    {
      "name": "CVE-2024-40972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
    },
    {
      "name": "CVE-2024-29025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
    },
    {
      "name": "CVE-2024-40959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
    },
    {
      "name": "CVE-2023-34453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
    },
    {
      "name": "CVE-2023-5072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
    },
    {
      "name": "CVE-2024-45590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
    },
    {
      "name": "CVE-2019-10202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10202"
    },
    {
      "name": "CVE-2024-43796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
    },
    {
      "name": "CVE-2021-32040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32040"
    },
    {
      "name": "CVE-2024-34158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
    },
    {
      "name": "CVE-2024-40974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2024-42124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
    },
    {
      "name": "CVE-2023-26117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26117"
    },
    {
      "name": "CVE-2022-3786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
    },
    {
      "name": "CVE-2023-52486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
    },
    {
      "name": "CVE-2014-0193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-0193"
    },
    {
      "name": "CVE-2022-21680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21680"
    },
    {
      "name": "CVE-2024-39502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
    },
    {
      "name": "CVE-2024-36005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
    },
    {
      "name": "CVE-2024-26929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26929"
    },
    {
      "name": "CVE-2019-14863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14863"
    },
    {
      "name": "CVE-2023-52683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
    },
    {
      "name": "CVE-2024-42131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
    },
    {
      "name": "CVE-2024-35944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35944"
    },
    {
      "name": "CVE-2024-21538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
    },
    {
      "name": "CVE-2023-52469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
    },
    {
      "name": "CVE-2024-35809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35809"
    },
    {
      "name": "CVE-2024-47764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
    },
    {
      "name": "CVE-2023-52809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
    },
    {
      "name": "CVE-2023-52451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
    },
    {
      "name": "CVE-2024-39472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
    },
    {
      "name": "CVE-2023-34455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2021-21295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
    },
    {
      "name": "CVE-2024-26733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2024-40998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
    },
    {
      "name": "CVE-2022-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46751"
    },
    {
      "name": "CVE-2023-52470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
    },
    {
      "name": "CVE-2021-43797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
    },
    {
      "name": "CVE-2020-7676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7676"
    },
    {
      "name": "CVE-2024-40995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
    },
    {
      "name": "CVE-2023-26118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26118"
    },
    {
      "name": "CVE-2024-42238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
    },
    {
      "name": "CVE-2024-34156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
    },
    {
      "name": "CVE-2024-43830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43830"
    },
    {
      "name": "CVE-2024-39501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
    },
    {
      "name": "CVE-2023-52730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
    },
    {
      "name": "CVE-2024-42090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
    },
    {
      "name": "CVE-2024-26960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
    },
    {
      "name": "CVE-2024-40901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
    },
    {
      "name": "CVE-2021-47321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47321"
    },
    {
      "name": "CVE-2024-26640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
    },
    {
      "name": "CVE-2024-40954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2024-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
    },
    {
      "name": "CVE-2019-10172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2024-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
    },
    {
      "name": "CVE-2024-47874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2024-27019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
    },
    {
      "name": "CVE-2024-43800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
    },
    {
      "name": "CVE-2024-28863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-41055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
    },
    {
      "name": "CVE-2024-41076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
    },
    {
      "name": "CVE-2024-39506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
    },
    {
      "name": "CVE-2024-40978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
    },
    {
      "name": "CVE-2021-21290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
    },
    {
      "name": "CVE-2019-10768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10768"
    },
    {
      "name": "CVE-2022-3602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
    },
    {
      "name": "CVE-2024-41044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
    },
    {
      "name": "CVE-2024-40958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
    },
    {
      "name": "CVE-2024-26717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
    },
    {
      "name": "CVE-2023-26136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
    },
    {
      "name": "CVE-2024-42152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
    },
    {
      "name": "CVE-2024-39499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
    },
    {
      "name": "CVE-2024-36006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
    },
    {
      "name": "CVE-2023-52476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52476"
    },
    {
      "name": "CVE-2023-52463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
    },
    {
      "name": "CVE-2024-41064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
    },
    {
      "name": "CVE-2024-34155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
    },
    {
      "name": "CVE-2023-52530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
    },
    {
      "name": "CVE-2024-36000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
    },
    {
      "name": "CVE-2024-26855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26855"
    },
    {
      "name": "CVE-2019-16869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869"
    },
    {
      "name": "CVE-2022-21681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21681"
    },
    {
      "name": "CVE-2024-42237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
    },
    {
      "name": "CVE-2024-24789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
    },
    {
      "name": "CVE-2024-27011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
    },
    {
      "name": "CVE-2019-20445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445"
    }
  ],
  "initial_release_date": "2025-01-10T00:00:00",
  "last_revision_date": "2025-01-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0021",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-01-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2025-01-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7180462",
      "url": "https://www.ibm.com/support/pages/node/7180462"
    },
    {
      "published_at": "2025-01-07",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7180361",
      "url": "https://www.ibm.com/support/pages/node/7180361"
    },
    {
      "published_at": "2025-01-04",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7180282",
      "url": "https://www.ibm.com/support/pages/node/7180282"
    },
    {
      "published_at": "2025-01-06",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7180314",
      "url": "https://www.ibm.com/support/pages/node/7180314"
    },
    {
      "published_at": "2025-01-09",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7180450",
      "url": "https://www.ibm.com/support/pages/node/7180450"
    },
    {
      "published_at": "2025-01-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7180545",
      "url": "https://www.ibm.com/support/pages/node/7180545"
    }
  ]
}
  CERTFR-2025-AVI-0760
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | User Entity Behavior Analytics pour IBM QRadar SIEM versions antérieures à 5.0.1 | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | Db2 | Db2 on Cloud Pak for Data versions antérieures à v5.2.1 | ||
| IBM | WebSphere | IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de sécurité APAR PH67137 et APAR PH67132 | ||
| IBM | WebSphere | Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty ART versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Cloud Pak for Applications versions 5.1 à 5.3 pour WebSphere Application Server Liberty sans les correctifs de sécurité APAR PH67132 et APAR PH67137 | ||
| IBM | WebSphere | Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalités jsonp sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Hybrid Edition version 5.1 sans les correctifs de sécurité APAR PH67137, APAR PH67132, | ||
| IBM | Db2 | Db2 Warehouse on Cloud Pak for Data versions antérieures à v5.2.1 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "User Entity Behavior Analytics pour IBM QRadar SIEM versions ant\u00e9rieures \u00e0 5.0.1",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Common Licensing pour Websphere Liberty Agent versions  9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
      "product": {
        "name": "Db2",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de s\u00e9curit\u00e9 APAR PH67137 et  APAR PH67132",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Engineering Test Management versions 7.0.2 et 7.0.3  pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty  versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Common Licensing pour Websphere Liberty ART versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty  versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Pak for Applications versions 5.1 \u00e0 5.3 pour WebSphere Application Server Liberty sans les correctifs de s\u00e9curit\u00e9 APAR PH67132 et APAR PH67137",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalit\u00e9s jsonp sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "WebSphere Hybrid Edition version 5.1 sans les correctifs de s\u00e9curit\u00e9 APAR PH67137, APAR PH67132,",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
      "product": {
        "name": "Db2",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-31129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
    },
    {
      "name": "CVE-2025-53547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
    },
    {
      "name": "CVE-2023-43642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
    },
    {
      "name": "CVE-2025-0755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0755"
    },
    {
      "name": "CVE-2025-25724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
    },
    {
      "name": "CVE-2023-1370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
    },
    {
      "name": "CVE-2025-27516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
    },
    {
      "name": "CVE-2024-55565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
    },
    {
      "name": "CVE-2024-51473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51473"
    },
    {
      "name": "CVE-2015-5237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
    },
    {
      "name": "CVE-2025-3445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
    },
    {
      "name": "CVE-2025-32386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
    },
    {
      "name": "CVE-2025-46762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46762"
    },
    {
      "name": "CVE-2025-32421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32421"
    },
    {
      "name": "CVE-2016-4055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4055"
    },
    {
      "name": "CVE-2024-43799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2024-45492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
    },
    {
      "name": "CVE-2025-4330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
    },
    {
      "name": "CVE-2024-56326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-4138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
    },
    {
      "name": "CVE-2025-30472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30472"
    },
    {
      "name": "CVE-2025-24528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
    },
    {
      "name": "CVE-2024-45813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45813"
    },
    {
      "name": "CVE-2022-36364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
    },
    {
      "name": "CVE-2023-5868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
    },
    {
      "name": "CVE-2025-48050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48050"
    },
    {
      "name": "CVE-2025-24970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
    },
    {
      "name": "CVE-2025-33092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
    },
    {
      "name": "CVE-2024-51479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
    },
    {
      "name": "CVE-2025-1647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1647"
    },
    {
      "name": "CVE-2023-39417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39417"
    },
    {
      "name": "CVE-2023-34462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
    },
    {
      "name": "CVE-2024-0406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
    },
    {
      "name": "CVE-2024-11831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
    },
    {
      "name": "CVE-2018-7489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
    },
    {
      "name": "CVE-2025-33143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33143"
    },
    {
      "name": "CVE-2021-3393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3393"
    },
    {
      "name": "CVE-2025-2533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2533"
    },
    {
      "name": "CVE-2019-10202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10202"
    },
    {
      "name": "CVE-2023-5870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2025-36097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
    },
    {
      "name": "CVE-2024-45490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
    },
    {
      "name": "CVE-2025-36010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-36010"
    },
    {
      "name": "CVE-2025-36047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-36047"
    },
    {
      "name": "CVE-2024-45491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
    },
    {
      "name": "CVE-2025-50182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
    },
    {
      "name": "CVE-2022-49846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
    },
    {
      "name": "CVE-2025-32462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
    },
    {
      "name": "CVE-2025-50181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
    },
    {
      "name": "CVE-2022-3510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
    },
    {
      "name": "CVE-2022-3509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
    },
    {
      "name": "CVE-2025-4517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
    },
    {
      "name": "CVE-2023-5869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
    },
    {
      "name": "CVE-2024-8184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
    },
    {
      "name": "CVE-2025-48068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48068"
    },
    {
      "name": "CVE-2024-48949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
    },
    {
      "name": "CVE-2025-52999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
    },
    {
      "name": "CVE-2025-33114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33114"
    },
    {
      "name": "CVE-2025-7783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
    },
    {
      "name": "CVE-2025-27152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
    },
    {
      "name": "CVE-2022-41862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
    },
    {
      "name": "CVE-2025-4435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
    },
    {
      "name": "CVE-2025-21966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
    },
    {
      "name": "CVE-2023-22467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22467"
    },
    {
      "name": "CVE-2022-24823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2024-48948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
    },
    {
      "name": "CVE-2024-12718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
    },
    {
      "name": "CVE-2019-9193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9193"
    },
    {
      "name": "CVE-2018-5968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
    },
    {
      "name": "CVE-2024-6763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
    },
    {
      "name": "CVE-2025-48976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
    },
    {
      "name": "CVE-2023-39410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
    },
    {
      "name": "CVE-2024-56332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2022-24785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
    },
    {
      "name": "CVE-2024-56201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
    },
    {
      "name": "CVE-2017-7525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
    },
    {
      "name": "CVE-2023-26133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26133"
    },
    {
      "name": "CVE-2024-6484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
    },
    {
      "name": "CVE-2024-6485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
    },
    {
      "name": "CVE-2023-2454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
    },
    {
      "name": "CVE-2024-9823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
    },
    {
      "name": "CVE-2025-26791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
    },
    {
      "name": "CVE-2024-56339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56339"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2022-1552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
    },
    {
      "name": "CVE-2024-49828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49828"
    },
    {
      "name": "CVE-2024-55549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
    },
    {
      "name": "CVE-2025-29927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
    },
    {
      "name": "CVE-2025-32387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
    },
    {
      "name": "CVE-2024-43800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
    },
    {
      "name": "CVE-2024-50602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
    },
    {
      "name": "CVE-2017-18214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18214"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2023-2455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
    },
    {
      "name": "CVE-2025-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
    },
    {
      "name": "CVE-2025-5702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
    },
    {
      "name": "CVE-2025-36071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-36071"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2024-0985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
    },
    {
      "name": "CVE-2017-15095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
    },
    {
      "name": "CVE-2024-36114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
    },
    {
      "name": "CVE-2025-27789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
    },
    {
      "name": "CVE-2019-12086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
    },
    {
      "name": "CVE-2024-6827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
    },
    {
      "name": "CVE-2023-52933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
    },
    {
      "name": "CVE-2021-21290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2022-2625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2625"
    },
    {
      "name": "CVE-2023-2976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
    },
    {
      "name": "CVE-2017-17485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
    },
    {
      "name": "CVE-2024-6762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6762"
    },
    {
      "name": "CVE-2022-1471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
    },
    {
      "name": "CVE-2024-52894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52894"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2022-3171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2025-6442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2024-51504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
    },
    {
      "name": "CVE-2022-41881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
    },
    {
      "name": "CVE-2025-47273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
    },
    {
      "name": "CVE-2025-21756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
    },
    {
      "name": "CVE-2018-1000873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000873"
    },
    {
      "name": "CVE-2023-32305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32305"
    },
    {
      "name": "CVE-2025-47287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47287"
    },
    {
      "name": "CVE-2024-57699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
    },
    {
      "name": "CVE-2025-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
    },
    {
      "name": "CVE-2025-48734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
    }
  ],
  "initial_release_date": "2025-09-05T00:00:00",
  "last_revision_date": "2025-09-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0760",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Injection SQL (SQLi)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2025-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243927",
      "url": "https://www.ibm.com/support/pages/node/7243927"
    },
    {
      "published_at": "2025-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243923",
      "url": "https://www.ibm.com/support/pages/node/7243923"
    },
    {
      "published_at": "2025-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243924",
      "url": "https://www.ibm.com/support/pages/node/7243924"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7244012",
      "url": "https://www.ibm.com/support/pages/node/7244012"
    },
    {
      "published_at": "2025-09-01",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243659",
      "url": "https://www.ibm.com/support/pages/node/7243659"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7244002",
      "url": "https://www.ibm.com/support/pages/node/7244002"
    },
    {
      "published_at": "2025-08-29",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243582",
      "url": "https://www.ibm.com/support/pages/node/7243582"
    },
    {
      "published_at": "2025-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243928",
      "url": "https://www.ibm.com/support/pages/node/7243928"
    },
    {
      "published_at": "2025-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243925",
      "url": "https://www.ibm.com/support/pages/node/7243925"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7244010",
      "url": "https://www.ibm.com/support/pages/node/7244010"
    },
    {
      "published_at": "2025-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243922",
      "url": "https://www.ibm.com/support/pages/node/7243922"
    },
    {
      "published_at": "2025-09-01",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243673",
      "url": "https://www.ibm.com/support/pages/node/7243673"
    },
    {
      "published_at": "2025-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7243877",
      "url": "https://www.ibm.com/support/pages/node/7243877"
    }
  ]
}
  CERTFR-2025-AVI-0309
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Storage Protect | Storage Protect Plus versions 10.1.x antérieures à 10.1.17 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Storage Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.17",
      "product": {
        "name": "Storage Protect",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2023-25577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
    },
    {
      "name": "CVE-2023-52448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
    },
    {
      "name": "CVE-2024-36974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
    },
    {
      "name": "CVE-2023-1076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1076"
    },
    {
      "name": "CVE-2024-12797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2024-26603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
    },
    {
      "name": "CVE-2023-4091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
    },
    {
      "name": "CVE-2024-56326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2023-23934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
    },
    {
      "name": "CVE-2024-2466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-52492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
    },
    {
      "name": "CVE-2024-34069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2024-36881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36881"
    },
    {
      "name": "CVE-2023-42669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
    },
    {
      "name": "CVE-2022-36280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
    },
    {
      "name": "CVE-2023-1409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1409"
    },
    {
      "name": "CVE-2023-52475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
    },
    {
      "name": "CVE-2024-7553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7553"
    },
    {
      "name": "CVE-2020-25659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
    },
    {
      "name": "CVE-2023-6240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2023-23931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
    },
    {
      "name": "CVE-2024-26782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26782"
    },
    {
      "name": "CVE-2024-8207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8207"
    },
    {
      "name": "CVE-2024-2379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2379"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-3372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3372"
    },
    {
      "name": "CVE-2024-26803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
    },
    {
      "name": "CVE-2024-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
    },
    {
      "name": "CVE-2024-36882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
    },
    {
      "name": "CVE-2023-46136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
    },
    {
      "name": "CVE-2023-52439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
    },
    {
      "name": "CVE-2023-38325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-56201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
    },
    {
      "name": "CVE-2023-3961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3961"
    },
    {
      "name": "CVE-2024-0841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2024-41042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-1151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
    },
    {
      "name": "CVE-2024-26646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26646"
    },
    {
      "name": "CVE-2020-36242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
    },
    {
      "name": "CVE-2024-36015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-52434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2023-52458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52458"
    },
    {
      "name": "CVE-2024-26602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
    },
    {
      "name": "CVE-2023-52466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52466"
    },
    {
      "name": "CVE-2024-26591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26591"
    },
    {
      "name": "CVE-2024-26611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
    },
    {
      "name": "CVE-2023-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2024-0340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
    },
    {
      "name": "CVE-2024-35995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
    }
  ],
  "initial_release_date": "2025-04-11T00:00:00",
  "last_revision_date": "2025-04-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0309",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2025-04-10",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7230557",
      "url": "https://www.ibm.com/support/pages/node/7230557"
    }
  ]
}
  CERTFR-2025-AVI-0563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411.x antérieures à 9.3.2411.107 | ||
| Splunk | SOAR | Splunk SOAR versions antérieures à 6.4.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Splunk DB Connect | Splunk DB Connect versions antérieures à 4.0.0 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408.x antérieures à 9.3.2408.117 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406.x antérieures à 9.2.2406.121 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.1.x antérieures à 9.1.10 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2411.x ant\u00e9rieures \u00e0 9.3.2411.107",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk SOAR versions ant\u00e9rieures \u00e0 6.4.1",
      "product": {
        "name": "SOAR",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
      "product": {
        "name": "Splunk DB Connect",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.117",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.121",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2022-30187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
    },
    {
      "name": "CVE-2024-12797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
    },
    {
      "name": "CVE-2024-2466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
    },
    {
      "name": "CVE-2025-27414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27414"
    },
    {
      "name": "CVE-2025-20324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20324"
    },
    {
      "name": "CVE-2025-23388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23388"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-20319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20319"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2020-28458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
    },
    {
      "name": "CVE-2025-20321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20321"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2025-20325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20325"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2025-23387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23387"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2021-23445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
    },
    {
      "name": "CVE-2024-48949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
    },
    {
      "name": "CVE-2025-23389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23389"
    },
    {
      "name": "CVE-2024-21538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
    },
    {
      "name": "CVE-2022-35583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35583"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2024-52804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52804"
    },
    {
      "name": "CVE-2025-20300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20300"
    },
    {
      "name": "CVE-2024-45801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-20323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20323"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-38999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
    },
    {
      "name": "CVE-2025-20320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20320"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-45230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45230"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2024-47875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
    },
    {
      "name": "CVE-2025-20322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20322"
    },
    {
      "name": "CVE-2024-21272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-21090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
    },
    {
      "name": "CVE-2013-7489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
    },
    {
      "name": "CVE-2025-27789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2024-52616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
    },
    {
      "name": "CVE-2024-0853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0853"
    },
    {
      "name": "CVE-2025-22952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22952"
    },
    {
      "name": "CVE-2024-32002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    }
  ],
  "initial_release_date": "2025-07-08T00:00:00",
  "last_revision_date": "2025-07-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0563",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0708",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0708"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0703",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0703"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0701",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0701"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0706",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0706"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0705",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0705"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0702",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0702"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0712",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0712"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0711",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0711"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0707",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0707"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0710",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0710"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0709",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0709"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0704",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0704"
    }
  ]
}
  CERTFR-2025-AVI-0546
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere Application Server versions 8.5.x sans les derniers correctifs de sécurité | ||
| IBM | WebSphere Service Registry and Repository | WebSphere Service Registry and Repository sans les derniers correctifs de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web services versions 6.4.x antérieures à 6.4.0.3 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x sans les derniers correctifs de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web services versions 6.3.x antérieures à 6.3.0.14 | ||
| IBM | Spectrum | Spectrum Protect Plus versions 10.1.x antérieures à 10.1.17.1 | ||
| IBM | QRadar | QRadar Hub versions antérieures à 3.8.3 | ||
| IBM | AIX | AIX versions 7.3.x sans les derniers correctif de sécurité | ||
| IBM | Db2 | DB2 Data Management Console pour CPD versions antérieures à 4.8.7 | ||
| IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.17 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WebSphere Application Server versions 8.5.x sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "WebSphere Service Registry and Repository sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "WebSphere Service Registry and Repository",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Connect:Direct Web services versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.3",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "WebSphere Application Server versions 9.0.x sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Connect:Direct Web services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.14",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.17.1",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Hub versions ant\u00e9rieures \u00e0 3.8.3",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX versions 7.3.x sans les derniers correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "DB2 Data Management Console pour CPD versions ant\u00e9rieures \u00e0 4.8.7",
      "product": {
        "name": "Db2",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.17",
      "product": {
        "name": "QRadar Deployment Intelligence App",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-25577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2025-27516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2023-23934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
    },
    {
      "name": "CVE-2024-34069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
    },
    {
      "name": "CVE-2024-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
    },
    {
      "name": "CVE-2020-29651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29651"
    },
    {
      "name": "CVE-2024-45590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
    },
    {
      "name": "CVE-2024-8305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8305"
    },
    {
      "name": "CVE-2023-1409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1409"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2024-7553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7553"
    },
    {
      "name": "CVE-2024-36124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36124"
    },
    {
      "name": "CVE-2024-56406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
    },
    {
      "name": "CVE-2025-27152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2024-8207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8207"
    },
    {
      "name": "CVE-2024-3372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3372"
    },
    {
      "name": "CVE-2025-33214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33214"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2023-46136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2019-20916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
    },
    {
      "name": "CVE-2020-7789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7789"
    },
    {
      "name": "CVE-2024-52798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2025-41232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2023-1077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
    },
    {
      "name": "CVE-2025-27789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
    },
    {
      "name": "CVE-2022-42969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
    },
    {
      "name": "CVE-2023-30861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30861"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2023-32681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
    },
    {
      "name": "CVE-2024-56334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56334"
    },
    {
      "name": "CVE-2020-28493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28493"
    },
    {
      "name": "CVE-2024-6375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6375"
    },
    {
      "name": "CVE-2025-36038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-36038"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    }
  ],
  "initial_release_date": "2025-06-27T00:00:00",
  "last_revision_date": "2025-06-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0546",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2025-06-27",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238297",
      "url": "https://www.ibm.com/support/pages/node/7238297"
    },
    {
      "published_at": "2025-06-23",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237702",
      "url": "https://www.ibm.com/support/pages/node/7237702"
    },
    {
      "published_at": "2025-06-25",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237967",
      "url": "https://www.ibm.com/support/pages/node/7237967"
    },
    {
      "published_at": "2025-06-26",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238168",
      "url": "https://www.ibm.com/support/pages/node/7238168"
    },
    {
      "published_at": "2025-06-26",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238156",
      "url": "https://www.ibm.com/support/pages/node/7238156"
    },
    {
      "published_at": "2025-06-26",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238155",
      "url": "https://www.ibm.com/support/pages/node/7238155"
    },
    {
      "published_at": "2025-06-27",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238295",
      "url": "https://www.ibm.com/support/pages/node/7238295"
    },
    {
      "published_at": "2025-06-26",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238159",
      "url": "https://www.ibm.com/support/pages/node/7238159"
    }
  ]
}
  CERTFR-2025-AVI-0641
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Enterprise Security | Enterprise Security versions antérieures à 8.1.0 | ||
| Splunk | Splunk User Behavior Analytics (UBA) | User Behavior Analytics (UBA) versions antérieures à 5.4.3 | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Enterprise Security versions ant\u00e9rieures \u00e0 8.1.0",
      "product": {
        "name": "Enterprise Security",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "User Behavior Analytics (UBA) versions ant\u00e9rieures \u00e0 5.4.3",
      "product": {
        "name": "Splunk User Behavior Analytics (UBA)",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
    },
    {
      "name": "CVE-2024-42459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-5590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5590"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2024-42460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
    },
    {
      "name": "CVE-2025-27144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
    },
    {
      "name": "CVE-2024-31141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31141"
    },
    {
      "name": "CVE-2022-33987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
    },
    {
      "name": "CVE-2024-40635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
    },
    {
      "name": "CVE-2024-48948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
    },
    {
      "name": "CVE-2025-25977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25977"
    },
    {
      "name": "CVE-2024-6763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
    },
    {
      "name": "CVE-2024-56128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56128"
    },
    {
      "name": "CVE-2022-42898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-12254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2024-42461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
    },
    {
      "name": "CVE-2025-21502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
    },
    {
      "name": "CVE-2023-38039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    },
    {
      "name": "CVE-2023-38545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
    }
  ],
  "initial_release_date": "2025-07-31T00:00:00",
  "last_revision_date": "2025-07-31T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0641",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-31T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-07-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0715",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0715"
    },
    {
      "published_at": "2025-07-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0713",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0713"
    },
    {
      "published_at": "2025-07-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0714",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0714"
    }
  ]
}
  CERTFR-2025-AVI-0233
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Control Center | Sterling Control Center versions 6.2.1.x antérieures à 6.2.1.0 iFix15 | ||
| IBM | Qradar Advisor | Qradar Advisor versions antérieures à 2.6.6 | ||
| IBM | AIX | AIX versions 7.2.x et 7.3.x sans les derniers correctifs de sécurité | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Sterling Control Center versions 6.2.1.x ant\u00e9rieures \u00e0 \t\n6.2.1.0 iFix15",
      "product": {
        "name": "Sterling Control Center",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Qradar Advisor versions ant\u00e9rieures \u00e0 2.6.6",
      "product": {
        "name": "Qradar Advisor",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX versions 7.2.x et 7.3.x sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-38986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38986"
    },
    {
      "name": "CVE-2024-29041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-43799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2024-34069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
    },
    {
      "name": "CVE-2024-45590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
    },
    {
      "name": "CVE-2024-43796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
    },
    {
      "name": "CVE-2024-1135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1135"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2024-47764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
    },
    {
      "name": "CVE-2024-56347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56347"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2023-28439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28439"
    },
    {
      "name": "CVE-2023-46136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-5569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
    },
    {
      "name": "CVE-2012-5784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-5784"
    },
    {
      "name": "CVE-2024-52798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
    },
    {
      "name": "CVE-2018-8032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-8032"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2024-4340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4340"
    },
    {
      "name": "CVE-2024-43800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
    },
    {
      "name": "CVE-2019-0227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0227"
    },
    {
      "name": "CVE-2024-56346",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56346"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2014-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3596"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2024-1681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1681"
    },
    {
      "name": "CVE-2024-6221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6221"
    },
    {
      "name": "CVE-2024-39689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
    },
    {
      "name": "CVE-2022-22321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22321"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    }
  ],
  "initial_release_date": "2025-03-21T00:00:00",
  "last_revision_date": "2025-03-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0233",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2025-03-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7186423",
      "url": "https://www.ibm.com/support/pages/node/7186423"
    },
    {
      "published_at": "2025-03-19",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7192736",
      "url": "https://www.ibm.com/support/pages/node/7192736"
    },
    {
      "published_at": "2025-03-18",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7186621",
      "url": "https://www.ibm.com/support/pages/node/7186621"
    }
  ]
}
  CERTFR-2025-AVI-0481
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM Cloud Pak for Security versions 1.10.x ant\u00e9rieures \u00e0 1.11.3.0",
      "product": {
        "name": "Cloud Pak",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Suite Software versions post\u00e9rieures \u00e0 1.10.12.0 et ant\u00e9rieures \u00e0  1.11.3.0 ",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-32996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32996"
    },
    {
      "name": "CVE-2019-11038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11038"
    },
    {
      "name": "CVE-2021-38593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38593"
    },
    {
      "name": "CVE-2025-1334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1334"
    },
    {
      "name": "CVE-2020-15250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2024-0793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0793"
    },
    {
      "name": "CVE-2017-9047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2024-56326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2025-27144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
    },
    {
      "name": "CVE-2022-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
    },
    {
      "name": "CVE-2024-11831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
    },
    {
      "name": "CVE-2025-30691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
    },
    {
      "name": "CVE-2024-38809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
    },
    {
      "name": "CVE-2025-27152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
    },
    {
      "name": "CVE-2024-47764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
    },
    {
      "name": "CVE-2023-52355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2024-56337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
    },
    {
      "name": "CVE-2025-32997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32997"
    },
    {
      "name": "CVE-2024-9902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9902"
    },
    {
      "name": "CVE-2025-21587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2024-56332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
    },
    {
      "name": "CVE-2024-56201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
    },
    {
      "name": "CVE-2024-38827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38827"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2025-25019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25019"
    },
    {
      "name": "CVE-2020-35538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35538"
    },
    {
      "name": "CVE-2025-30698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
    },
    {
      "name": "CVE-2025-26791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2024-38828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
    },
    {
      "name": "CVE-2018-5711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5711"
    },
    {
      "name": "CVE-2023-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
    },
    {
      "name": "CVE-2025-25022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25022"
    },
    {
      "name": "CVE-2025-25020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25020"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2024-43800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
    },
    {
      "name": "CVE-2022-1354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
    },
    {
      "name": "CVE-2025-25021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25021"
    },
    {
      "name": "CVE-2024-52304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52304"
    },
    {
      "name": "CVE-2023-24607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24607"
    },
    {
      "name": "CVE-2025-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
    },
    {
      "name": "CVE-2025-27789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
    },
    {
      "name": "CVE-2024-57556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57556"
    },
    {
      "name": "CVE-2025-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
    },
    {
      "name": "CVE-2025-24928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
    },
    {
      "name": "CVE-2024-50379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
    },
    {
      "name": "CVE-2023-24056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2024-52317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52317"
    },
    {
      "name": "CVE-2024-52316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
    },
    {
      "name": "CVE-2022-3570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
    }
  ],
  "initial_release_date": "2025-06-06T00:00:00",
  "last_revision_date": "2025-06-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0481",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2025-06-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7235432",
      "url": "https://www.ibm.com/support/pages/node/7235432"
    },
    {
      "published_at": "2025-06-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7235402",
      "url": "https://www.ibm.com/support/pages/node/7235402"
    }
  ]
}
  ncsc-2025-0124
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Communications producten, waaronder de Cloud Native Core en Policy Management.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden in Oracle Communications producten stellen ongeauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en kunnen leiden tot Denial-of-Service (DoS) aanvallen. Specifieke versies van de Cloud Native Core, zoals de Binding Support Function en Network Repository Function, zijn getroffen, met CVSS-scores die vari\u00ebren van 4.3 tot 9.8, wat wijst op significante risico\u0027s voor de beschikbaarheid en vertrouwelijkheid van de systemen.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
        "title": "CWE-44"
      },
      {
        "category": "general",
        "text": "Use of Incorrectly-Resolved Name or Reference",
        "title": "CWE-706"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
        "title": "CWE-1321"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
        "title": "CWE-79"
      },
      {
        "category": "general",
        "text": "Dependency on Vulnerable Third-Party Component",
        "title": "CWE-1395"
      },
      {
        "category": "general",
        "text": "Improper Isolation or Compartmentalization",
        "title": "CWE-653"
      },
      {
        "category": "general",
        "text": "Always-Incorrect Control Flow Implementation",
        "title": "CWE-670"
      },
      {
        "category": "general",
        "text": "Use of Potentially Dangerous Function",
        "title": "CWE-676"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements Used in a Template Engine",
        "title": "CWE-1336"
      },
      {
        "category": "general",
        "text": "Missing Report of Error Condition",
        "title": "CWE-392"
      },
      {
        "category": "general",
        "text": "Missing Release of Resource after Effective Lifetime",
        "title": "CWE-772"
      },
      {
        "category": "general",
        "text": "Observable Timing Discrepancy",
        "title": "CWE-208"
      },
      {
        "category": "general",
        "text": "Incorrect Resource Transfer Between Spheres",
        "title": "CWE-669"
      },
      {
        "category": "general",
        "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
        "title": "CWE-349"
      },
      {
        "category": "general",
        "text": "Excessive Iteration",
        "title": "CWE-834"
      },
      {
        "category": "general",
        "text": "Incorrect Implementation of Authentication Algorithm",
        "title": "CWE-303"
      },
      {
        "category": "general",
        "text": "Incorrect Permission Assignment for Critical Resource",
        "title": "CWE-732"
      },
      {
        "category": "general",
        "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
        "title": "CWE-367"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
        "title": "CWE-917"
      },
      {
        "category": "general",
        "text": "Improper Validation of Syntactic Correctness of Input",
        "title": "CWE-1286"
      },
      {
        "category": "general",
        "text": "Improper Check for Unusual or Exceptional Conditions",
        "title": "CWE-754"
      },
      {
        "category": "general",
        "text": "Integer Overflow to Buffer Overflow",
        "title": "CWE-680"
      },
      {
        "category": "general",
        "text": "Insufficient Verification of Data Authenticity",
        "title": "CWE-345"
      },
      {
        "category": "general",
        "text": "Divide By Zero",
        "title": "CWE-369"
      },
      {
        "category": "general",
        "text": "Files or Directories Accessible to External Parties",
        "title": "CWE-552"
      },
      {
        "category": "general",
        "text": "Authorization Bypass Through User-Controlled Key",
        "title": "CWE-639"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Missing Authorization",
        "title": "CWE-862"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Inefficient Regular Expression Complexity",
        "title": "CWE-1333"
      },
      {
        "category": "general",
        "text": "Improper Certificate Validation",
        "title": "CWE-295"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Use of a Broken or Risky Cryptographic Algorithm",
        "title": "CWE-327"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Uncontrolled Recursion",
        "title": "CWE-674"
      },
      {
        "category": "general",
        "text": "Improper Restriction of XML External Entity Reference",
        "title": "CWE-611"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "Improper Privilege Management",
        "title": "CWE-269"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd; oracle",
        "url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle Communications",
    "tracking": {
      "current_release_date": "2025-04-16T08:39:55.217751Z",
      "generator": {
        "date": "2025-02-25T15:15:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.0"
        }
      },
      "id": "NCSC-2025-0124",
      "initial_release_date": "2025-04-16T08:39:55.217751Z",
      "revision_history": [
        {
          "date": "2025-04-16T08:39:55.217751Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.1",
                    "product": {
                      "name": "vers:unknown/24.2.1",
                      "product_id": "CSAFPID-1838578"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.0",
                    "product": {
                      "name": "vers:unknown/24.2.0",
                      "product_id": "CSAFPID-1838586"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Binding Support Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
                    "product": {
                      "name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
                      "product_id": "CSAFPID-1838591"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Policy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.1",
                    "product": {
                      "name": "vers:unknown/24.2.1",
                      "product_id": "CSAFPID-1838592"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Console"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.0",
                    "product": {
                      "name": "vers:unknown/24.2.0",
                      "product_id": "CSAFPID-1838572"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.1",
                    "product": {
                      "name": "vers:unknown/24.2.1",
                      "product_id": "CSAFPID-1838581"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.2",
                    "product": {
                      "name": "vers:unknown/24.2.2",
                      "product_id": "CSAFPID-1838584"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Security Edge Protection Proxy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=6.0|\u003c=6.1",
                    "product": {
                      "name": "vers:unknown/\u003e=6.0|\u003c=6.1",
                      "product_id": "CSAFPID-2698355"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Unified Assurance"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.3.0",
                    "product": {
                      "name": "vers:unknown/24.3.0",
                      "product_id": "CSAFPID-2698333"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Management Cloud Engine"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.0",
                    "product": {
                      "name": "vers:unknown/24.2.0",
                      "product_id": "CSAFPID-2698334"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Network Data Analytics Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.5",
                    "product": {
                      "name": "vers:unknown/24.2.5",
                      "product_id": "CSAFPID-2698374"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Network Function Cloud Native Environment"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.0.0",
                    "product": {
                      "name": "vers:unknown/9.0.0",
                      "product_id": "CSAFPID-1234193"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.0.1",
                    "product": {
                      "name": "vers:unknown/9.0.1",
                      "product_id": "CSAFPID-1234261"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.0.2",
                    "product": {
                      "name": "vers:unknown/9.0.2",
                      "product_id": "CSAFPID-2698362"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.0.3",
                    "product": {
                      "name": "vers:unknown/9.0.3",
                      "product_id": "CSAFPID-2698358"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
                    "product": {
                      "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
                      "product_id": "CSAFPID-2698372"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Element Manager"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/15.0.0.0.0",
                    "product": {
                      "name": "vers:unknown/15.0.0.0.0",
                      "product_id": "CSAFPID-1837923"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Policy Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
                    "product": {
                      "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
                      "product_id": "CSAFPID-2698373"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Session Report Manager"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.1.1.9",
                    "product": {
                      "name": "vers:unknown/9.1.1.9",
                      "product_id": "CSAFPID-2698357"
                    }
                  }
                ],
                "category": "product_name",
                "name": "SD-WAN Edge"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.3",
                    "product": {
                      "name": "vers:unknown/24.2.3",
                      "product_id": "CSAFPID-1838579"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.3.0",
                    "product": {
                      "name": "vers:unknown/24.3.0",
                      "product_id": "CSAFPID-1838582"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Unified Data Repository"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/10.0.0",
                    "product": {
                      "name": "vers:unknown/10.0.0",
                      "product_id": "CSAFPID-2698381"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.2.0",
                    "product": {
                      "name": "vers:unknown/9.2.0",
                      "product_id": "CSAFPID-1207518"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.3.0",
                    "product": {
                      "name": "vers:unknown/9.3.0",
                      "product_id": "CSAFPID-1207704"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Session Border Controller"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/4.1.0",
                    "product": {
                      "name": "vers:unknown/4.1.0",
                      "product_id": "CSAFPID-1207607"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/4.2.0",
                    "product": {
                      "name": "vers:unknown/4.2.0",
                      "product_id": "CSAFPID-1207752"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Enterprise Communications Broker"
              }
            ],
            "category": "product_family",
            "name": "Oracle"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1839911",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.1",
                    "product": {
                      "name": "vers:oracle/24.2.1",
                      "product_id": "CSAFPID-1839908",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
                    "product": {
                      "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
                      "product_id": "CSAFPID-2698963",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0-24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Binding Support Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-2698973",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.4",
                    "product": {
                      "name": "vers:oracle/24.2.4",
                      "product_id": "CSAFPID-2699085",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.4:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-1839941",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core DBTier"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
                    "product": {
                      "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
                      "product_id": "CSAFPID-1839907",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
                    "product": {
                      "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
                      "product_id": "CSAFPID-2698965",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.4:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
                    "product": {
                      "name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
                      "product_id": "CSAFPID-2698944",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.1-24.2.4:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Policy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.1",
                    "product": {
                      "name": "vers:oracle/24.2.1",
                      "product_id": "CSAFPID-1839952",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-2699038",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Certificate Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.1",
                    "product": {
                      "name": "vers:oracle/24.2.1",
                      "product_id": "CSAFPID-1839951",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-2699059",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Console"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-1839919",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-2698957",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Network Repository Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/23.4.0",
                    "product": {
                      "name": "vers:oracle/23.4.0",
                      "product_id": "CSAFPID-1839924",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1839910",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.1",
                    "product": {
                      "name": "vers:oracle/24.2.1",
                      "product_id": "CSAFPID-1839909",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-1839894",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-2698958",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-2699094",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1839934",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-2699086",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-1839935",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/25.1.100",
                    "product": {
                      "name": "vers:oracle/25.1.100",
                      "product_id": "CSAFPID-2699073",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:25.1.100:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Service Communication Proxy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/46.6",
                    "product": {
                      "name": "vers:oracle/46.6",
                      "product_id": "CSAFPID-2698993",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications EAGLE Element Management System"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/5.1",
                    "product": {
                      "name": "vers:oracle/5.1",
                      "product_id": "CSAFPID-1839893",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/5.2",
                    "product": {
                      "name": "vers:oracle/5.2",
                      "product_id": "CSAFPID-1839895",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Operations Monitor"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.11",
                    "product": {
                      "name": "vers:oracle/12.11",
                      "product_id": "CSAFPID-1839890",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.0",
                    "product": {
                      "name": "vers:oracle/14.0",
                      "product_id": "CSAFPID-1839891",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.0.0",
                    "product": {
                      "name": "vers:oracle/14.0.0",
                      "product_id": "CSAFPID-2699072",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0",
                    "product": {
                      "name": "vers:oracle/15.0",
                      "product_id": "CSAFPID-1839961",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0",
                      "product_id": "CSAFPID-2699023",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.1",
                    "product": {
                      "name": "vers:oracle/15.0.1",
                      "product_id": "CSAFPID-2699025",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.2",
                    "product": {
                      "name": "vers:oracle/15.0.2",
                      "product_id": "CSAFPID-2699024",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications User Data Repository"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.0.0",
                    "product": {
                      "name": "vers:oracle/9.0.0.0",
                      "product_id": "CSAFPID-2698999",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Diameter Signaling Router"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-2698996",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:management_cloud_engine:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Management Cloud Engine"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-2699007",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Network Data Analytics Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1839868",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.5",
                    "product": {
                      "name": "vers:oracle/24.2.5",
                      "product_id": "CSAFPID-2699029",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.5:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-1839869",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.0",
                    "product": {
                      "name": "vers:oracle/9.0.0",
                      "product_id": "CSAFPID-2699013",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.1",
                    "product": {
                      "name": "vers:oracle/9.0.1",
                      "product_id": "CSAFPID-2699012",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.2",
                    "product": {
                      "name": "vers:oracle/9.0.2",
                      "product_id": "CSAFPID-2699016",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.3",
                    "product": {
                      "name": "vers:oracle/9.0.3",
                      "product_id": "CSAFPID-2699015",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
                    "product": {
                      "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
                      "product_id": "CSAFPID-2699098",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Element Manager"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0.0.0",
                      "product_id": "CSAFPID-1839960",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Policy Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.0",
                    "product": {
                      "name": "vers:oracle/9.0.0",
                      "product_id": "CSAFPID-2699093",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.1",
                    "product": {
                      "name": "vers:oracle/9.0.1",
                      "product_id": "CSAFPID-2699092",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.2",
                    "product": {
                      "name": "vers:oracle/9.0.2",
                      "product_id": "CSAFPID-2699091",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.3",
                    "product": {
                      "name": "vers:oracle/9.0.3",
                      "product_id": "CSAFPID-2699090",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
                    "product": {
                      "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
                      "product_id": "CSAFPID-2699124",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Session Report Manager"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.1.1.9",
                    "product": {
                      "name": "vers:oracle/9.1.1.9",
                      "product_id": "CSAFPID-2698959",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:sd-wan_edge:9.1.1.9:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle SD-WAN Edge"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/22.4.0",
                    "product": {
                      "name": "vers:oracle/22.4.0",
                      "product_id": "CSAFPID-2699181",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/23.4.4",
                    "product": {
                      "name": "vers:oracle/23.4.4",
                      "product_id": "CSAFPID-1839930",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.1.1",
                    "product": {
                      "name": "vers:oracle/24.1.1",
                      "product_id": "CSAFPID-1839933",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-1839931",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-1839963",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-1839932",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/25.1.100",
                    "product": {
                      "name": "vers:oracle/25.1.100",
                      "product_id": "CSAFPID-2698956",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:25.1.100:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
                    "product": {
                      "name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
                      "product_id": "CSAFPID-2699180",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0-23.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Unified Data Repository"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/10.0.0",
                    "product": {
                      "name": "vers:oracle/10.0.0",
                      "product_id": "CSAFPID-2699083",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:10.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.2.0",
                    "product": {
                      "name": "vers:oracle/9.2.0",
                      "product_id": "CSAFPID-1839887",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.3.0",
                    "product": {
                      "name": "vers:oracle/9.3.0",
                      "product_id": "CSAFPID-1839889",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Session Border Controller"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/4.1.0",
                    "product": {
                      "name": "vers:oracle/4.1.0",
                      "product_id": "CSAFPID-1839888",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.1.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/4.2.0",
                    "product": {
                      "name": "vers:oracle/4.2.0",
                      "product_id": "CSAFPID-1839886",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Enterprise Communications Broker"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.1.0",
                    "product": {
                      "name": "vers:oracle/24.1.0",
                      "product_id": "CSAFPID-1839925",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1840027",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-2699041",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
                    "product": {
                      "name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
                      "product_id": "CSAFPID-2698961",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0-24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Network Analytics Data Director"
              }
            ],
            "category": "product_family",
            "name": "Oracle Communications"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
                  "product_id": "CSAFPID-1145869"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
                  "product_id": "CSAFPID-1145271",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
                  "product_id": "CSAFPID-1173947",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Binding Support Function"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
                  "product_id": "CSAFPID-1145868"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
                  "product_id": "CSAFPID-1145270",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
                  "product_id": "CSAFPID-1173946",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Policy"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.3",
                "product": {
                  "name": "vers:oracle/23.4.3",
                  "product_id": "CSAFPID-1173942",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.0",
                "product": {
                  "name": "vers:oracle/24.2.0",
                  "product_id": "CSAFPID-1173945",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Certificate Management"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.2",
                "product": {
                  "name": "vers:oracle/23.4.2",
                  "product_id": "CSAFPID-1173940",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.0",
                "product": {
                  "name": "vers:oracle/24.2.0",
                  "product_id": "CSAFPID-1173941",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Console"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.4",
                "product": {
                  "name": "vers:oracle/23.4.4",
                  "product_id": "CSAFPID-1173965",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.1",
                "product": {
                  "name": "vers:oracle/24.2.1",
                  "product_id": "CSAFPID-1173967",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Network Repository Function"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.2",
                "product": {
                  "name": "vers:oracle/23.4.2",
                  "product_id": "CSAFPID-1173943",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.0",
                "product": {
                  "name": "vers:oracle/24.2.0",
                  "product_id": "CSAFPID-1173944",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.0",
                "product": {
                  "name": "vers:oracle/23.4.0",
                  "product_id": "CSAFPID-1145265",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.1.0",
                "product": {
                  "name": "vers:oracle/24.1.0",
                  "product_id": "CSAFPID-1145273",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.0",
                "product": {
                  "name": "vers:oracle/24.2.0",
                  "product_id": "CSAFPID-1174046",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Service Communication Proxy"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.3.6",
                    "product": {
                      "name": "vers:oracle/7.3.6",
                      "product_id": "CSAFPID-2699077",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.0",
                    "product": {
                      "name": "vers:oracle/7.4.0",
                      "product_id": "CSAFPID-2699075",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.5.0",
                    "product": {
                      "name": "vers:oracle/7.5.0",
                      "product_id": "CSAFPID-2699076",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.5.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Network Integrity"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/6.0",
                    "product": {
                      "name": "vers:oracle/6.0",
                      "product_id": "CSAFPID-2699027",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
                    "product": {
                      "name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
                      "product_id": "CSAFPID-1839852",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
                    "product": {
                      "name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
                      "product_id": "CSAFPID-1840033",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=6.0|\u003c=6.1",
                    "product": {
                      "name": "vers:oracle/\u003e=6.0|\u003c=6.1",
                      "product_id": "CSAFPID-2698955",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0-6.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Unified Assurance"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.0.0.8.0",
                    "product": {
                      "name": "vers:oracle/12.0.0.8.0",
                      "product_id": "CSAFPID-2699001",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.8.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0.0.0",
                      "product_id": "CSAFPID-2699084",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.1.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.1.0.0",
                      "product_id": "CSAFPID-2699079",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
                    "product": {
                      "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
                      "product_id": "CSAFPID-2699058",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
                    "product": {
                      "name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
                      "product_id": "CSAFPID-1839957",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
                    "product": {
                      "name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
                      "product_id": "CSAFPID-2699000",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0-15.0.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
                    "product": {
                      "name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
                      "product_id": "CSAFPID-1839953",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Billing and Revenue Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.1.0.26.0",
                    "product": {
                      "name": "vers:oracle/8.1.0.26.0",
                      "product_id": "CSAFPID-2698964",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Messaging Server"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/6.3.1",
                    "product": {
                      "name": "vers:oracle/6.3.1",
                      "product_id": "CSAFPID-2698991",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications MetaSolv Solution"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.0.6.0.0",
                    "product": {
                      "name": "vers:oracle/12.0.6.0.0",
                      "product_id": "CSAFPID-2699127",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0.0.0",
                      "product_id": "CSAFPID-2699126",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.1.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.1.0.0",
                      "product_id": "CSAFPID-2699128",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Network Charging and Control"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.0",
                    "product": {
                      "name": "vers:oracle/7.4.0",
                      "product_id": "CSAFPID-1839980",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.5.0",
                    "product": {
                      "name": "vers:oracle/7.5.0",
                      "product_id": "CSAFPID-1840004",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.1",
                    "product": {
                      "name": "vers:oracle/7.4.1",
                      "product_id": "CSAFPID-1839981",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Order and Service Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0.0.0",
                      "product_id": "CSAFPID-2699056",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.1.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.1.0.0",
                      "product_id": "CSAFPID-2699063",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
                    "product": {
                      "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
                      "product_id": "CSAFPID-2699060",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Pricing Design Center"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.0.0.3",
                    "product": {
                      "name": "vers:oracle/8.0.0.3",
                      "product_id": "CSAFPID-1839921",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.0.0.4.0",
                    "product": {
                      "name": "vers:oracle/8.0.0.4.0",
                      "product_id": "CSAFPID-2698975",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.1.0.1",
                    "product": {
                      "name": "vers:oracle/8.1.0.1",
                      "product_id": "CSAFPID-1839922",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.1.0.2.0",
                    "product": {
                      "name": "vers:oracle/8.1.0.2.0",
                      "product_id": "CSAFPID-2698974",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Service Catalog and Design"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.1",
                    "product": {
                      "name": "vers:oracle/7.4.1",
                      "product_id": "CSAFPID-1839978",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.2",
                    "product": {
                      "name": "vers:oracle/7.4.2",
                      "product_id": "CSAFPID-1839979",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.5.0",
                    "product": {
                      "name": "vers:oracle/7.5.0",
                      "product_id": "CSAFPID-2699035",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.5.1",
                    "product": {
                      "name": "vers:oracle/7.5.1",
                      "product_id": "CSAFPID-1839983",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.6.0",
                    "product": {
                      "name": "vers:oracle/7.6.0",
                      "product_id": "CSAFPID-1840005",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.6.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.7.0",
                    "product": {
                      "name": "vers:oracle/7.7.0",
                      "product_id": "CSAFPID-2699034",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.7.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
                    "product": {
                      "name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
                      "product_id": "CSAFPID-2699036",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0-7.4.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
                    "product": {
                      "name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
                      "product_id": "CSAFPID-2699096",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0-7.5.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Unified Inventory Management"
              }
            ],
            "category": "product_family",
            "name": "Oracle Communications Applications"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.0",
                "product": {
                  "name": "vers:oracle/23.4.0",
                  "product_id": "CSAFPID-1145246",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.1.0",
                "product": {
                  "name": "vers:oracle/24.1.0",
                  "product_id": "CSAFPID-1145247",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:semver/7.4.0",
                "product": {
                  "name": "vers:semver/7.4.0",
                  "product_id": "CSAFPID-2698653"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/7.4.1",
                "product": {
                  "name": "vers:semver/7.4.1",
                  "product_id": "CSAFPID-2698654"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/7.5.0",
                "product": {
                  "name": "vers:semver/7.5.0",
                  "product_id": "CSAFPID-2698655"
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Order and Service Management"
          }
        ],
        "category": "vendor",
        "name": "Oracle Corporation"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-5388",
      "cwe": {
        "id": "CWE-208",
        "name": "Observable Timing Discrepancy"
      },
      "notes": [
        {
          "category": "other",
          "text": "Observable Timing Discrepancy",
          "title": "CWE-208"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5388",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5388.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2023-5388"
    },
    {
      "cve": "CVE-2023-5685",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5685",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2023-5685"
    },
    {
      "cve": "CVE-2023-49582",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-49582",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2023-49582"
    },
    {
      "cve": "CVE-2023-51074",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-51074",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51074.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2023-51074"
    },
    {
      "cve": "CVE-2024-1135",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-1135",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-1135"
    },
    {
      "cve": "CVE-2024-4227",
      "cwe": {
        "id": "CWE-834",
        "name": "Excessive Iteration"
      },
      "notes": [
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4227",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4227.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-4227"
    },
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Dependency on Vulnerable Third-Party Component",
          "title": "CWE-1395"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5535",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-6763",
      "cwe": {
        "id": "CWE-1286",
        "name": "Improper Validation of Syntactic Correctness of Input"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Syntactic Correctness of Input",
          "title": "CWE-1286"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6763",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
        }
      ],
      "title": "CVE-2024-6763"
    },
    {
      "cve": "CVE-2024-7254",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7254",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-7254"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11053",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-11053"
    },
    {
      "cve": "CVE-2024-12797",
      "cwe": {
        "id": "CWE-392",
        "name": "Missing Report of Error Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Report of Error Condition",
          "title": "CWE-392"
        },
        {
          "category": "other",
          "text": "Dependency on Vulnerable Third-Party Component",
          "title": "CWE-1395"
        },
        {
          "category": "other",
          "text": "Improper Certificate Validation",
          "title": "CWE-295"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-12797",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12797.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-12797"
    },
    {
      "cve": "CVE-2024-12798",
      "cwe": {
        "id": "CWE-917",
        "name": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
          "title": "CWE-917"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-12798",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12798.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-12798"
    },
    {
      "cve": "CVE-2024-21538",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21538",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21538.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-21538"
    },
    {
      "cve": "CVE-2024-25638",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        },
        {
          "category": "other",
          "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
          "title": "CWE-349"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25638",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.9,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-25638"
    },
    {
      "cve": "CVE-2024-28168",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28168",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-28168"
    },
    {
      "cve": "CVE-2024-28219",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "Use of Potentially Dangerous Function",
          "title": "CWE-676"
        },
        {
          "category": "other",
          "text": "Integer Overflow to Buffer Overflow",
          "title": "CWE-680"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28219",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-28219"
    },
    {
      "cve": "CVE-2024-28834",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Use of a Broken or Risky Cryptographic Algorithm",
          "title": "CWE-327"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28834",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-28834"
    },
    {
      "cve": "CVE-2024-31141",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Files or Directories Accessible to External Parties",
          "title": "CWE-552"
        },
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-31141",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31141.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-31141"
    },
    {
      "cve": "CVE-2024-34064",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-34064",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-34064"
    },
    {
      "cve": "CVE-2024-35195",
      "cwe": {
        "id": "CWE-670",
        "name": "Always-Incorrect Control Flow Implementation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Always-Incorrect Control Flow Implementation",
          "title": "CWE-670"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-35195",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-35195"
    },
    {
      "cve": "CVE-2024-37891",
      "cwe": {
        "id": "CWE-669",
        "name": "Incorrect Resource Transfer Between Spheres"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Resource Transfer Between Spheres",
          "title": "CWE-669"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38819",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38819",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-38819"
    },
    {
      "cve": "CVE-2024-38827",
      "cwe": {
        "id": "CWE-639",
        "name": "Authorization Bypass Through User-Controlled Key"
      },
      "notes": [
        {
          "category": "other",
          "text": "Authorization Bypass Through User-Controlled Key",
          "title": "CWE-639"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38827",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-38827"
    },
    {
      "cve": "CVE-2024-40896",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-40896",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-40896"
    },
    {
      "cve": "CVE-2024-43044",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-43044",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-43044"
    },
    {
      "cve": "CVE-2024-43709",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-43709",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43709.json"
        }
      ],
      "title": "CVE-2024-43709"
    },
    {
      "cve": "CVE-2024-43796",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-43796",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43796.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-43796"
    },
    {
      "cve": "CVE-2024-47072",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47072",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-47072"
    },
    {
      "cve": "CVE-2024-47554",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47554",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-47554"
    },
    {
      "cve": "CVE-2024-49767",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-49767",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-49767"
    },
    {
      "cve": "CVE-2024-50602",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50602",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-50602"
    },
    {
      "cve": "CVE-2024-52046",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-52046",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-52046"
    },
    {
      "cve": "CVE-2024-52303",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-52303",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52303.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-52303"
    },
    {
      "cve": "CVE-2024-53122",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Divide By Zero",
          "title": "CWE-369"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-53122",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53122.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-53122"
    },
    {
      "cve": "CVE-2024-56128",
      "cwe": {
        "id": "CWE-303",
        "name": "Incorrect Implementation of Authentication Algorithm"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Implementation of Authentication Algorithm",
          "title": "CWE-303"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-56128",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-56128"
    },
    {
      "cve": "CVE-2024-56337",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-56337",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-56337"
    },
    {
      "cve": "CVE-2024-57699",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-57699",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-57699"
    },
    {
      "cve": "CVE-2025-1974",
      "cwe": {
        "id": "CWE-653",
        "name": "Improper Isolation or Compartmentalization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Isolation or Compartmentalization",
          "title": "CWE-653"
        },
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-1974",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-1974"
    },
    {
      "cve": "CVE-2025-23084",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-23084",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23084.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-23084"
    },
    {
      "cve": "CVE-2025-23184",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-23184",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json"
        }
      ],
      "title": "CVE-2025-23184"
    },
    {
      "cve": "CVE-2025-24813",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "other",
          "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
          "title": "CWE-44"
        },
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        },
        {
          "category": "other",
          "text": "Use of Incorrectly-Resolved Name or Reference",
          "title": "CWE-706"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24813",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-24813"
    },
    {
      "cve": "CVE-2025-24928",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24928",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24928.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-24928"
    },
    {
      "cve": "CVE-2025-24970",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24970",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-24970"
    },
    {
      "cve": "CVE-2025-27516",
      "cwe": {
        "id": "CWE-1336",
        "name": "Improper Neutralization of Special Elements Used in a Template Engine"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements Used in a Template Engine",
          "title": "CWE-1336"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27516",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27516.json"
        }
      ],
      "title": "CVE-2025-27516"
    },
    {
      "cve": "CVE-2025-27789",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27789",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27789.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-27789"
    },
    {
      "cve": "CVE-2025-30729",
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30729",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30729.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-30729"
    },
    {
      "cve": "CVE-2025-31721",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Authorization",
          "title": "CWE-862"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-31721",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31721.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-31721"
    }
  ]
}
  ncsc-2025-0021
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Dependency on Vulnerable Third-Party Component",
        "title": "CWE-1395"
      },
      {
        "category": "general",
        "text": "Always-Incorrect Control Flow Implementation",
        "title": "CWE-670"
      },
      {
        "category": "general",
        "text": "Asymmetric Resource Consumption (Amplification)",
        "title": "CWE-405"
      },
      {
        "category": "general",
        "text": "Path Traversal: \u0027.../...//\u0027",
        "title": "CWE-35"
      },
      {
        "category": "general",
        "text": "Return of Pointer Value Outside of Expected Range",
        "title": "CWE-466"
      },
      {
        "category": "general",
        "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
        "title": "CWE-338"
      },
      {
        "category": "general",
        "text": "Use of Potentially Dangerous Function",
        "title": "CWE-676"
      },
      {
        "category": "general",
        "text": "Unchecked Input for Loop Condition",
        "title": "CWE-606"
      },
      {
        "category": "general",
        "text": "Multiple Interpretations of UI Input",
        "title": "CWE-450"
      },
      {
        "category": "general",
        "text": "Incorrect Calculation of Buffer Size",
        "title": "CWE-131"
      },
      {
        "category": "general",
        "text": "Use of Weak Hash",
        "title": "CWE-328"
      },
      {
        "category": "general",
        "text": "Improper Handling of Length Parameter Inconsistency",
        "title": "CWE-130"
      },
      {
        "category": "general",
        "text": "Incorrect Resource Transfer Between Spheres",
        "title": "CWE-669"
      },
      {
        "category": "general",
        "text": "Insufficient Granularity of Access Control",
        "title": "CWE-1220"
      },
      {
        "category": "general",
        "text": "Insertion of Sensitive Information Into Sent Data",
        "title": "CWE-201"
      },
      {
        "category": "general",
        "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
        "title": "CWE-349"
      },
      {
        "category": "general",
        "text": "Improper Handling of Exceptional Conditions",
        "title": "CWE-755"
      },
      {
        "category": "general",
        "text": "Improper Verification of Cryptographic Signature",
        "title": "CWE-347"
      },
      {
        "category": "general",
        "text": "Excessive Iteration",
        "title": "CWE-834"
      },
      {
        "category": "general",
        "text": "Improper Handling of Case Sensitivity",
        "title": "CWE-178"
      },
      {
        "category": "general",
        "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
        "title": "CWE-367"
      },
      {
        "category": "general",
        "text": "Expected Behavior Violation",
        "title": "CWE-440"
      },
      {
        "category": "general",
        "text": "Double Free",
        "title": "CWE-415"
      },
      {
        "category": "general",
        "text": "Missing Encryption of Sensitive Data",
        "title": "CWE-311"
      },
      {
        "category": "general",
        "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
        "title": "CWE-924"
      },
      {
        "category": "general",
        "text": "Improper Check for Unusual or Exceptional Conditions",
        "title": "CWE-754"
      },
      {
        "category": "general",
        "text": "Improper Check or Handling of Exceptional Conditions",
        "title": "CWE-703"
      },
      {
        "category": "general",
        "text": "Reachable Assertion",
        "title": "CWE-617"
      },
      {
        "category": "general",
        "text": "Uncontrolled Search Path Element",
        "title": "CWE-427"
      },
      {
        "category": "general",
        "text": "Use of Password Hash Instead of Password for Authentication",
        "title": "CWE-836"
      },
      {
        "category": "general",
        "text": "Integer Overflow to Buffer Overflow",
        "title": "CWE-680"
      },
      {
        "category": "general",
        "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
        "title": "CWE-843"
      },
      {
        "category": "general",
        "text": "Relative Path Traversal",
        "title": "CWE-23"
      },
      {
        "category": "general",
        "text": "Improper Encoding or Escaping of Output",
        "title": "CWE-116"
      },
      {
        "category": "general",
        "text": "Insufficient Verification of Data Authenticity",
        "title": "CWE-345"
      },
      {
        "category": "general",
        "text": "Observable Discrepancy",
        "title": "CWE-203"
      },
      {
        "category": "general",
        "text": "Improper Validation of Integrity Check Value",
        "title": "CWE-354"
      },
      {
        "category": "general",
        "text": "Missing Cryptographic Step",
        "title": "CWE-325"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "User Interface (UI) Misrepresentation of Critical Information",
        "title": "CWE-451"
      },
      {
        "category": "general",
        "text": "UNIX Symbolic Link (Symlink) Following",
        "title": "CWE-61"
      },
      {
        "category": "general",
        "text": "Files or Directories Accessible to External Parties",
        "title": "CWE-552"
      },
      {
        "category": "general",
        "text": "Authorization Bypass Through User-Controlled Key",
        "title": "CWE-639"
      },
      {
        "category": "general",
        "text": "Use of Hard-coded Credentials",
        "title": "CWE-798"
      },
      {
        "category": "general",
        "text": "Unrestricted Upload of File with Dangerous Type",
        "title": "CWE-434"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Inefficient Regular Expression Complexity",
        "title": "CWE-1333"
      },
      {
        "category": "general",
        "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
        "title": "CWE-1321"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Use of a Broken or Risky Cryptographic Algorithm",
        "title": "CWE-327"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Uncaught Exception",
        "title": "CWE-248"
      },
      {
        "category": "general",
        "text": "Uncontrolled Recursion",
        "title": "CWE-674"
      },
      {
        "category": "general",
        "text": "Incorrect Authorization",
        "title": "CWE-863"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Improper Restriction of XML External Entity Reference",
        "title": "CWE-611"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
        "title": "CWE-835"
      },
      {
        "category": "general",
        "text": "Improper Privilege Management",
        "title": "CWE-269"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Generation of Error Message Containing Sensitive Information",
        "title": "CWE-209"
      },
      {
        "category": "general",
        "text": "Incorrect Default Permissions",
        "title": "CWE-276"
      },
      {
        "category": "general",
        "text": "Authentication Bypass by Capture-replay",
        "title": "CWE-294"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
        "title": "CWE-79"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd; oracle",
        "url": "https://www.oracle.com/security-alerts/cpujan2025.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle Communications",
    "tracking": {
      "current_release_date": "2025-01-22T13:30:50.189632Z",
      "id": "NCSC-2025-0021",
      "initial_release_date": "2025-01-22T13:30:50.189632Z",
      "revision_history": [
        {
          "date": "2025-01-22T13:30:50.189632Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1727475",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635313",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635305",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635311",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635312",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635323",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670430",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674632",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674630",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635320",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674633",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670439",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635322",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670429",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670435",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670431",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670436",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670432",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635321",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635310",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635318",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674640",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674642",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670434",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635316",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674639",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635314",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674638",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674637",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635306",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635307",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635317",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635319",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670438",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635324",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635315",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670433",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674641",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674635",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674636",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670437",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674631",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674634",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635308",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635309",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications__10.4.0.4",
            "product": {
              "name": "communications__10.4.0.4",
              "product_id": "CSAFPID-1674629",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.2",
            "product": {
              "name": "communications___23.4.2",
              "product_id": "CSAFPID-1670442",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.3",
            "product": {
              "name": "communications___23.4.3",
              "product_id": "CSAFPID-1635325",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.4",
            "product": {
              "name": "communications___23.4.4",
              "product_id": "CSAFPID-1635326",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.5",
            "product": {
              "name": "communications___23.4.5",
              "product_id": "CSAFPID-1674645",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.6",
            "product": {
              "name": "communications___23.4.6",
              "product_id": "CSAFPID-1674646",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___24.2.0",
            "product": {
              "name": "communications___24.2.0",
              "product_id": "CSAFPID-1674644",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___7.2.1.0.0",
            "product": {
              "name": "communications___7.2.1.0.0",
              "product_id": "CSAFPID-1670441",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___8.6.0.6",
            "product": {
              "name": "communications___8.6.0.6",
              "product_id": "CSAFPID-1635327",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___8.6.0.8",
            "product": {
              "name": "communications___8.6.0.8",
              "product_id": "CSAFPID-1635328",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___9.0.2",
            "product": {
              "name": "communications___9.0.2",
              "product_id": "CSAFPID-1670440",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___9.0.3",
            "product": {
              "name": "communications___9.0.3",
              "product_id": "CSAFPID-1635329",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___9.1.1.8.0",
            "product": {
              "name": "communications___9.1.1.8.0",
              "product_id": "CSAFPID-1674643",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751386",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674621",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751381",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751383",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751378",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751377",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751385",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674618",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674619",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674622",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751384",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674617",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674623",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751382",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751380",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1751379",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674620",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___12.0.6.0.0",
            "product": {
              "name": "communications_applications___12.0.6.0.0",
              "product_id": "CSAFPID-1674627",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___5.5.22",
            "product": {
              "name": "communications_applications___5.5.22",
              "product_id": "CSAFPID-1674626",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___6.0.3",
            "product": {
              "name": "communications_applications___6.0.3",
              "product_id": "CSAFPID-1674628",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___6.0.4",
            "product": {
              "name": "communications_applications___6.0.4",
              "product_id": "CSAFPID-1674624",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___6.0.5",
            "product": {
              "name": "communications_applications___6.0.5",
              "product_id": "CSAFPID-1674625",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_asap",
            "product": {
              "name": "communications_asap",
              "product_id": "CSAFPID-816792",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-764735",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-1751255",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-1751254",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-816793",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-912557",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-764247",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-1650820",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-912556",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-1751303",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-220055",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-816765",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-816766",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-816767",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1503577",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1751300",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-764237",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1650752",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1673396",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1751085",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1751079",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1673526",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1673391",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1673394",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1751253",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-816768",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-816769",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-912085",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1503578",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1673389",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1673390",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1751090",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_dbtier",
            "product": {
              "name": "communications_cloud_native_core_dbtier",
              "product_id": "CSAFPID-1673421",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_dbtier",
            "product": {
              "name": "communications_cloud_native_core_dbtier",
              "product_id": "CSAFPID-1673420",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_dbtier",
            "product": {
              "name": "communications_cloud_native_core_dbtier",
              "product_id": "CSAFPID-1751246",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-816770",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-816771",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-912068",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-1503579",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-816772",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-912076",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-1503580",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-219838",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-611387",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-816773",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912101",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-1503581",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-1751208",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-1751209",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912539",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912540",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912541",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912542",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912543",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-816774",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-816346",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-912077",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1503322",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1673413",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1673415",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1751231",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-816775",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-912544",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816348",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-912545",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816347",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-1673494",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816776",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816777",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-764240",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1650751",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1673517",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1673395",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-912069",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1751225",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1751088",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1751089",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-94291",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-816778",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-614517",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-912547",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1673392",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1503582",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1673393",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1751081",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1751084",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-912546",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-224795",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-912548",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-912102",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-912549",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1503583",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1503584",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1503585",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1672767",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1751241",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-764826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-90016",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-912078",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-816349",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-912550",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1503586",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1503587",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1751238",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1751240",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1673399",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1751239",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1751080",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1751082",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-816779",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server",
            "product": {
              "name": "communications_converged_application_server",
              "product_id": "CSAFPID-1751229",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server",
            "product": {
              "name": "communications_converged_application_server",
              "product_id": "CSAFPID-1751230",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_charging_system",
            "product": {
              "name": "communications_converged_charging_system",
              "product_id": "CSAFPID-1503599",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_charging_system",
            "product": {
              "name": "communications_converged_charging_system",
              "product_id": "CSAFPID-1503600",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-1751292",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-1751294",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-224793",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-1751295",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-816794",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-342793",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-1650777",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-1265",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-816350",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-1261",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-1672764",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1503588",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1751104",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-40293",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1751242",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1751237",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1751097",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-611413",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1751211",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-912551",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-912552",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_element_management_system",
            "product": {
              "name": "communications_eagle_element_management_system",
              "product_id": "CSAFPID-1503316",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_element_management_system",
            "product": {
              "name": "communications_eagle_element_management_system",
              "product_id": "CSAFPID-1503317",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_element_management_system",
            "product": {
              "name": "communications_eagle_element_management_system",
              "product_id": "CSAFPID-1751243",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-764242",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-819413",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-819414",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-816780",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_fraud_monitor",
            "product": {
              "name": "communications_fraud_monitor",
              "product_id": "CSAFPID-816781",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_fraud_monitor",
            "product": {
              "name": "communications_fraud_monitor",
              "product_id": "CSAFPID-816782",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_fraud_monitor",
            "product": {
              "name": "communications_fraud_monitor",
              "product_id": "CSAFPID-912553",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_instant_messaging_server",
            "product": {
              "name": "communications_instant_messaging_server",
              "product_id": "CSAFPID-219803",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_ip_service_activator",
            "product": {
              "name": "communications_ip_service_activator",
              "product_id": "CSAFPID-204622",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_ip_service_activator",
            "product": {
              "name": "communications_ip_service_activator",
              "product_id": "CSAFPID-219909",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-816351",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-1751218",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_metasolv_solution",
            "product": {
              "name": "communications_metasolv_solution",
              "product_id": "CSAFPID-611595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816353",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816352",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-1503589",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-1503590",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-1673414",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816783",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816786",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816784",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816787",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816785",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816788",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-342803",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-1650778",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-1266",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-816354",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-204563",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_integrity",
            "product": {
              "name": "communications_network_integrity",
              "product_id": "CSAFPID-219776",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_offline_mediation_controller",
            "product": {
              "name": "communications_offline_mediation_controller",
              "product_id": "CSAFPID-765242",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_offline_mediation_controller",
            "product": {
              "name": "communications_offline_mediation_controller",
              "product_id": "CSAFPID-916906",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_offline_mediation_controller",
            "product": {
              "name": "communications_offline_mediation_controller",
              "product_id": "CSAFPID-1751247",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_offline_mediation_controller",
            "product": {
              "name": "communications_offline_mediation_controller",
              "product_id": "CSAFPID-1751248",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-93781",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-220132",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-912079",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-224790",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-221118",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-1673496",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence",
            "product": {
              "name": "communications_performance_intelligence",
              "product_id": "CSAFPID-1503591",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-816789",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-816790",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-764738",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-816355",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-1503601",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816359",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816358",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816357",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-912558",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-1751233",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-1503602",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-1751234",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816795",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816796",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816797",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503592",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503593",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1672762",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503594",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-342804",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-819415",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-819416",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-816791",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-240600",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673382",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1650731",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673530",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1751235",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1751296",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-764739",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-8984",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-204510",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-204569",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-219826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-912073",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1503596",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1503597",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1503598",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1751217",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-912080",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1673481",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1751258",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-912554",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "oracle"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-41727",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-41727",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json"
        }
      ],
      "title": "CVE-2022-41727"
    },
    {
      "cve": "CVE-2023-4408",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4408",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
        }
      ],
      "title": "CVE-2023-4408"
    },
    {
      "cve": "CVE-2023-5678",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        },
        {
          "category": "other",
          "text": "Missing Cryptographic Step",
          "title": "CWE-325"
        },
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-764237",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-816348",
          "CSAFPID-764240",
          "CSAFPID-614517",
          "CSAFPID-224795",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-342804",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-764739",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-912073",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5678",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
        }
      ],
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5981",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "other",
          "text": "Observable Discrepancy",
          "title": "CWE-203"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1751217",
          "CSAFPID-1673481"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5981",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1751217",
            "CSAFPID-1673481"
          ]
        }
      ],
      "title": "CVE-2023-5981"
    },
    {
      "cve": "CVE-2023-6597",
      "cwe": {
        "id": "CWE-61",
        "name": "UNIX Symbolic Link (Symlink) Following"
      },
      "notes": [
        {
          "category": "other",
          "text": "UNIX Symbolic Link (Symlink) Following",
          "title": "CWE-61"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1751097"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6597",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1751097"
          ]
        }
      ],
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-7256",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Double Free",
          "title": "CWE-415"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220132",
          "CSAFPID-1751084",
          "CSAFPID-912079"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-7256",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220132",
            "CSAFPID-1751084",
            "CSAFPID-912079"
          ]
        }
      ],
      "title": "CVE-2023-7256"
    },
    {
      "cve": "CVE-2023-29407",
      "cwe": {
        "id": "CWE-834",
        "name": "Excessive Iteration"
      },
      "notes": [
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-29407",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530"
          ]
        }
      ],
      "title": "CVE-2023-29407"
    },
    {
      "cve": "CVE-2023-29408",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-29408",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2023-29408"
    },
    {
      "cve": "CVE-2023-40577",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751208",
          "CSAFPID-1751209"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-40577",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751208",
            "CSAFPID-1751209"
          ]
        }
      ],
      "title": "CVE-2023-40577"
    },
    {
      "cve": "CVE-2023-46218",
      "cwe": {
        "id": "CWE-201",
        "name": "Insertion of Sensitive Information Into Sent Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insertion of Sensitive Information Into Sent Data",
          "title": "CWE-201"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764237",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816348",
          "CSAFPID-816773",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912068",
          "CSAFPID-912073",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-1751211"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46218",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764237",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816348",
            "CSAFPID-816773",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912068",
            "CSAFPID-912073",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-1751211"
          ]
        }
      ],
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-912539",
          "CSAFPID-816773",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-912545",
          "CSAFPID-764240",
          "CSAFPID-912546",
          "CSAFPID-614517",
          "CSAFPID-912547",
          "CSAFPID-224795",
          "CSAFPID-912548",
          "CSAFPID-912102",
          "CSAFPID-912549",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912553",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-342804",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-765242",
          "CSAFPID-912073",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-1751211"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46219",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-912539",
            "CSAFPID-816773",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-912545",
            "CSAFPID-764240",
            "CSAFPID-912546",
            "CSAFPID-614517",
            "CSAFPID-912547",
            "CSAFPID-224795",
            "CSAFPID-912548",
            "CSAFPID-912102",
            "CSAFPID-912549",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912553",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-342804",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-765242",
            "CSAFPID-912073",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-1751211"
          ]
        }
      ],
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-46604",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-94291",
          "CSAFPID-40293",
          "CSAFPID-1265",
          "CSAFPID-1261",
          "CSAFPID-1266",
          "CSAFPID-8984",
          "CSAFPID-764237",
          "CSAFPID-764240",
          "CSAFPID-224795",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-764739",
          "CSAFPID-219826",
          "CSAFPID-204510",
          "CSAFPID-204563",
          "CSAFPID-204569",
          "CSAFPID-204622",
          "CSAFPID-219803",
          "CSAFPID-219838",
          "CSAFPID-219909",
          "CSAFPID-221118",
          "CSAFPID-224790",
          "CSAFPID-224793",
          "CSAFPID-240600",
          "CSAFPID-342793",
          "CSAFPID-342803",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-611595",
          "CSAFPID-614517",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764738",
          "CSAFPID-816346",
          "CSAFPID-816347",
          "CSAFPID-816348",
          "CSAFPID-816349",
          "CSAFPID-816350",
          "CSAFPID-816351",
          "CSAFPID-816352",
          "CSAFPID-816353",
          "CSAFPID-816354",
          "CSAFPID-816355",
          "CSAFPID-816357",
          "CSAFPID-816358",
          "CSAFPID-816359",
          "CSAFPID-816765",
          "CSAFPID-816766",
          "CSAFPID-816767",
          "CSAFPID-816768",
          "CSAFPID-816769",
          "CSAFPID-816770",
          "CSAFPID-816771",
          "CSAFPID-816772",
          "CSAFPID-816773",
          "CSAFPID-816774",
          "CSAFPID-816775",
          "CSAFPID-816776",
          "CSAFPID-816777",
          "CSAFPID-816778",
          "CSAFPID-816779",
          "CSAFPID-816780",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-816783",
          "CSAFPID-816784",
          "CSAFPID-816785",
          "CSAFPID-816786",
          "CSAFPID-816787",
          "CSAFPID-816788",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-816791",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-816794",
          "CSAFPID-816795",
          "CSAFPID-816796",
          "CSAFPID-816797",
          "CSAFPID-912068",
          "CSAFPID-912073",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-1751104"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46604",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-94291",
            "CSAFPID-40293",
            "CSAFPID-1265",
            "CSAFPID-1261",
            "CSAFPID-1266",
            "CSAFPID-8984",
            "CSAFPID-764237",
            "CSAFPID-764240",
            "CSAFPID-224795",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-219776",
            "CSAFPID-765242",
            "CSAFPID-764739",
            "CSAFPID-219826",
            "CSAFPID-204510",
            "CSAFPID-204563",
            "CSAFPID-204569",
            "CSAFPID-204622",
            "CSAFPID-219803",
            "CSAFPID-219838",
            "CSAFPID-219909",
            "CSAFPID-221118",
            "CSAFPID-224790",
            "CSAFPID-224793",
            "CSAFPID-240600",
            "CSAFPID-342793",
            "CSAFPID-342803",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-611595",
            "CSAFPID-614517",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764738",
            "CSAFPID-816346",
            "CSAFPID-816347",
            "CSAFPID-816348",
            "CSAFPID-816349",
            "CSAFPID-816350",
            "CSAFPID-816351",
            "CSAFPID-816352",
            "CSAFPID-816353",
            "CSAFPID-816354",
            "CSAFPID-816355",
            "CSAFPID-816357",
            "CSAFPID-816358",
            "CSAFPID-816359",
            "CSAFPID-816765",
            "CSAFPID-816766",
            "CSAFPID-816767",
            "CSAFPID-816768",
            "CSAFPID-816769",
            "CSAFPID-816770",
            "CSAFPID-816771",
            "CSAFPID-816772",
            "CSAFPID-816773",
            "CSAFPID-816774",
            "CSAFPID-816775",
            "CSAFPID-816776",
            "CSAFPID-816777",
            "CSAFPID-816778",
            "CSAFPID-816779",
            "CSAFPID-816780",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-816783",
            "CSAFPID-816784",
            "CSAFPID-816785",
            "CSAFPID-816786",
            "CSAFPID-816787",
            "CSAFPID-816788",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-816791",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-816794",
            "CSAFPID-816795",
            "CSAFPID-816796",
            "CSAFPID-816797",
            "CSAFPID-912068",
            "CSAFPID-912073",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-1751104"
          ]
        }
      ],
      "title": "CVE-2023-46604"
    },
    {
      "cve": "CVE-2023-50868",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-50868",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
        }
      ],
      "title": "CVE-2023-50868"
    },
    {
      "cve": "CVE-2024-0232",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650777",
          "CSAFPID-1650778",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1751218",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0232",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
        }
      ],
      "title": "CVE-2024-0232"
    },
    {
      "cve": "CVE-2024-0397",
      "product_status": {
        "known_affected": [
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1673530"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0397",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1673530"
          ]
        }
      ],
      "title": "CVE-2024-0397"
    },
    {
      "cve": "CVE-2024-0450",
      "cwe": {
        "id": "CWE-450",
        "name": "Multiple Interpretations of UI Input"
      },
      "notes": [
        {
          "category": "other",
          "text": "Multiple Interpretations of UI Input",
          "title": "CWE-450"
        },
        {
          "category": "other",
          "text": "Asymmetric Resource Consumption (Amplification)",
          "title": "CWE-405"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1727475",
          "CSAFPID-1751097"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0450",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1727475",
            "CSAFPID-1751097"
          ]
        }
      ],
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-1442",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-1442",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-1442"
    },
    {
      "cve": "CVE-2024-2961",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1672762",
          "CSAFPID-1672764",
          "CSAFPID-1672767",
          "CSAFPID-1673396",
          "CSAFPID-1673395",
          "CSAFPID-1673494",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1727475",
          "CSAFPID-1751097",
          "CSAFPID-1751237"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2961",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1672762",
            "CSAFPID-1672764",
            "CSAFPID-1672767",
            "CSAFPID-1673396",
            "CSAFPID-1673395",
            "CSAFPID-1673494",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1727475",
            "CSAFPID-1751097",
            "CSAFPID-1751237"
          ]
        }
      ],
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-3596",
      "cwe": {
        "id": "CWE-924",
        "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
          "title": "CWE-924"
        },
        {
          "category": "other",
          "text": "Use of Weak Hash",
          "title": "CWE-328"
        },
        {
          "category": "other",
          "text": "Authentication Bypass by Capture-replay",
          "title": "CWE-294"
        },
        {
          "category": "other",
          "text": "Use of Password Hash Instead of Password for Authentication",
          "title": "CWE-836"
        },
        {
          "category": "other",
          "text": "Use of a Broken or Risky Cryptographic Algorithm",
          "title": "CWE-327"
        },
        {
          "category": "other",
          "text": "User Interface (UI) Misrepresentation of Critical Information",
          "title": "CWE-451"
        },
        {
          "category": "other",
          "text": "Improper Validation of Integrity Check Value",
          "title": "CWE-354"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751090",
          "CSAFPID-912079",
          "CSAFPID-220132",
          "CSAFPID-1751253"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-3596",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751090",
            "CSAFPID-912079",
            "CSAFPID-220132",
            "CSAFPID-1751253"
          ]
        }
      ],
      "title": "CVE-2024-3596"
    },
    {
      "cve": "CVE-2024-4030",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Default Permissions",
          "title": "CWE-276"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4030",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530"
          ]
        }
      ],
      "title": "CVE-2024-4030"
    },
    {
      "cve": "CVE-2024-4032",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Expected Behavior Violation",
          "title": "CWE-440"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4032",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530"
          ]
        }
      ],
      "title": "CVE-2024-4032"
    },
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Dependency on Vulnerable Third-Party Component",
          "title": "CWE-1395"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751090",
          "CSAFPID-1751253"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5535",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751090",
            "CSAFPID-1751253"
          ]
        }
      ],
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-6119",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
          "title": "CWE-843"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751209"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6119",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751209"
          ]
        }
      ],
      "title": "CVE-2024-6119"
    },
    {
      "cve": "CVE-2024-6162",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650751",
          "CSAFPID-1673526",
          "CSAFPID-1673399",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1727475",
          "CSAFPID-1751303",
          "CSAFPID-1650820",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6162",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650751",
            "CSAFPID-1673526",
            "CSAFPID-1673399",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1727475",
            "CSAFPID-1751303",
            "CSAFPID-1650820",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-6162"
    },
    {
      "cve": "CVE-2024-6232",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6232",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530"
          ]
        }
      ],
      "title": "CVE-2024-6232"
    },
    {
      "cve": "CVE-2024-7254",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673391",
          "CSAFPID-1673394",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1751225",
          "CSAFPID-1751233",
          "CSAFPID-1673530",
          "CSAFPID-1751234",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7254",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673391",
            "CSAFPID-1673394",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1751225",
            "CSAFPID-1751233",
            "CSAFPID-1673530",
            "CSAFPID-1751234",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-7254"
    },
    {
      "cve": "CVE-2024-7592",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7592",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-7592"
    },
    {
      "cve": "CVE-2024-7885",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673526",
          "CSAFPID-1673399",
          "CSAFPID-1751080",
          "CSAFPID-1751090",
          "CSAFPID-1751079",
          "CSAFPID-1751225",
          "CSAFPID-1672767",
          "CSAFPID-1751241",
          "CSAFPID-1751081",
          "CSAFPID-1751084",
          "CSAFPID-1673393",
          "CSAFPID-1751085",
          "CSAFPID-1751231"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7885",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673526",
            "CSAFPID-1673399",
            "CSAFPID-1751080",
            "CSAFPID-1751090",
            "CSAFPID-1751079",
            "CSAFPID-1751225",
            "CSAFPID-1672767",
            "CSAFPID-1751241",
            "CSAFPID-1751081",
            "CSAFPID-1751084",
            "CSAFPID-1673393",
            "CSAFPID-1751085",
            "CSAFPID-1751231"
          ]
        }
      ],
      "title": "CVE-2024-7885"
    },
    {
      "cve": "CVE-2024-8006",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220132",
          "CSAFPID-1751084",
          "CSAFPID-912079"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-8006",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220132",
            "CSAFPID-1751084",
            "CSAFPID-912079"
          ]
        }
      ],
      "title": "CVE-2024-8006"
    },
    {
      "cve": "CVE-2024-9143",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751253"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-9143",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
        }
      ],
      "title": "CVE-2024-9143"
    },
    {
      "cve": "CVE-2024-22195",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-764237",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-764240",
          "CSAFPID-614517",
          "CSAFPID-224795",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-342804",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-764739",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-912073",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-1751225",
          "CSAFPID-1751079",
          "CSAFPID-1751081",
          "CSAFPID-1673393",
          "CSAFPID-1751085"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22195",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-764237",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-764240",
            "CSAFPID-614517",
            "CSAFPID-224795",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-342804",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-219776",
            "CSAFPID-765242",
            "CSAFPID-764739",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-912073",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-1751225",
            "CSAFPID-1751079",
            "CSAFPID-1751081",
            "CSAFPID-1673393",
            "CSAFPID-1751085"
          ]
        }
      ],
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-24786",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24786",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-24786"
    },
    {
      "cve": "CVE-2024-24791",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751208",
          "CSAFPID-1751209"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24791",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751208",
            "CSAFPID-1751209"
          ]
        }
      ],
      "title": "CVE-2024-24791"
    },
    {
      "cve": "CVE-2024-25638",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        },
        {
          "category": "other",
          "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
          "title": "CWE-349"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1751225",
          "CSAFPID-1751079",
          "CSAFPID-1751229",
          "CSAFPID-1751230",
          "CSAFPID-1751081",
          "CSAFPID-1751084",
          "CSAFPID-1673393",
          "CSAFPID-1751085",
          "CSAFPID-1751231"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25638",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.9,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1751225",
            "CSAFPID-1751079",
            "CSAFPID-1751229",
            "CSAFPID-1751230",
            "CSAFPID-1751081",
            "CSAFPID-1751084",
            "CSAFPID-1673393",
            "CSAFPID-1751085",
            "CSAFPID-1751231"
          ]
        }
      ],
      "title": "CVE-2024-25638"
    },
    {
      "cve": "CVE-2024-25710",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-912101",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-764240",
          "CSAFPID-614517",
          "CSAFPID-224795",
          "CSAFPID-912102",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-342804",
          "CSAFPID-912080",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-764739",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-912073",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-1727475",
          "CSAFPID-1751218"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25710",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-912101",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-764240",
            "CSAFPID-614517",
            "CSAFPID-224795",
            "CSAFPID-912102",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-342804",
            "CSAFPID-912080",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-219776",
            "CSAFPID-765242",
            "CSAFPID-764739",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-912073",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-1727475",
            "CSAFPID-1751218"
          ]
        }
      ],
      "title": "CVE-2024-25710"
    },
    {
      "cve": "CVE-2024-26308",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764237",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816348",
          "CSAFPID-816773",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912068",
          "CSAFPID-912073",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-1727475",
          "CSAFPID-1751218",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26308",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764237",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816348",
            "CSAFPID-816773",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912068",
            "CSAFPID-912073",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-1727475",
            "CSAFPID-1751218",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-26308"
    },
    {
      "cve": "CVE-2024-27309",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751233",
          "CSAFPID-1751234",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-27309",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751233",
            "CSAFPID-1751234",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-27309"
    },
    {
      "cve": "CVE-2024-28219",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "Use of Potentially Dangerous Function",
          "title": "CWE-676"
        },
        {
          "category": "other",
          "text": "Integer Overflow to Buffer Overflow",
          "title": "CWE-680"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751079",
          "CSAFPID-1751225",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1751085",
          "CSAFPID-912547"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28219",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751079",
            "CSAFPID-1751225",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1751085",
            "CSAFPID-912547"
          ]
        }
      ],
      "title": "CVE-2024-28219"
    },
    {
      "cve": "CVE-2024-28834",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Use of a Broken or Risky Cryptographic Algorithm",
          "title": "CWE-327"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673481",
          "CSAFPID-1751217",
          "CSAFPID-1503590"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28834",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673481",
            "CSAFPID-1751217",
            "CSAFPID-1503590"
          ]
        }
      ],
      "title": "CVE-2024-28834"
    },
    {
      "cve": "CVE-2024-28835",
      "cwe": {
        "id": "CWE-248",
        "name": "Uncaught Exception"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncaught Exception",
          "title": "CWE-248"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673481",
          "CSAFPID-1751217",
          "CSAFPID-1503590"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28835",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673481",
            "CSAFPID-1751217",
            "CSAFPID-1503590"
          ]
        }
      ],
      "title": "CVE-2024-28835"
    },
    {
      "cve": "CVE-2024-28849",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673414",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1727475",
          "CSAFPID-1751235",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28849",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673414",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1727475",
            "CSAFPID-1751235",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-28849"
    },
    {
      "cve": "CVE-2024-29025",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650751",
          "CSAFPID-1673494",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1727475",
          "CSAFPID-1751233",
          "CSAFPID-1751218",
          "CSAFPID-1751234",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29025",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650751",
            "CSAFPID-1673494",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1727475",
            "CSAFPID-1751233",
            "CSAFPID-1751218",
            "CSAFPID-1751234",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-29025"
    },
    {
      "cve": "CVE-2024-29131",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650820",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-1673496",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1673530"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29131",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650820",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-1673496",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1673530"
          ]
        }
      ],
      "title": "CVE-2024-29131"
    },
    {
      "cve": "CVE-2024-29133",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650820",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-1673496",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1673530",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29133",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650820",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-1673496",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1673530",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-29133"
    },
    {
      "cve": "CVE-2024-33599",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673396",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1672762",
          "CSAFPID-1673395",
          "CSAFPID-1672764",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673494",
          "CSAFPID-1751237"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33599",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673396",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1672762",
            "CSAFPID-1673395",
            "CSAFPID-1672764",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673494",
            "CSAFPID-1751237"
          ]
        }
      ],
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673396",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1672762",
          "CSAFPID-1673395",
          "CSAFPID-1672764",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673494",
          "CSAFPID-1751237"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33600",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673396",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1672762",
            "CSAFPID-1673395",
            "CSAFPID-1672764",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673494",
            "CSAFPID-1751237"
          ]
        }
      ],
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "cwe": {
        "id": "CWE-703",
        "name": "Improper Check or Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        },
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673396",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1672762",
          "CSAFPID-1673395",
          "CSAFPID-1672764",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673494",
          "CSAFPID-1751237"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33601",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673396",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1672762",
            "CSAFPID-1673395",
            "CSAFPID-1672764",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673494",
            "CSAFPID-1751237"
          ]
        }
      ],
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "other",
          "text": "Return of Pointer Value Outside of Expected Range",
          "title": "CWE-466"
        },
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673396",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1672762",
          "CSAFPID-1673395",
          "CSAFPID-1672764",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673494",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1751237"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33602",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673396",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1672762",
            "CSAFPID-1673395",
            "CSAFPID-1672764",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673494",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1751237"
          ]
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34064",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1727475",
          "CSAFPID-1751238",
          "CSAFPID-1751225",
          "CSAFPID-1751079",
          "CSAFPID-1751081",
          "CSAFPID-1673393",
          "CSAFPID-1751239",
          "CSAFPID-1751082",
          "CSAFPID-1751240",
          "CSAFPID-1672767",
          "CSAFPID-1751241",
          "CSAFPID-1673481",
          "CSAFPID-1751085"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-34064",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1727475",
            "CSAFPID-1751238",
            "CSAFPID-1751225",
            "CSAFPID-1751079",
            "CSAFPID-1751081",
            "CSAFPID-1673393",
            "CSAFPID-1751239",
            "CSAFPID-1751082",
            "CSAFPID-1751240",
            "CSAFPID-1672767",
            "CSAFPID-1751241",
            "CSAFPID-1673481",
            "CSAFPID-1751085"
          ]
        }
      ],
      "title": "CVE-2024-34064"
    },
    {
      "cve": "CVE-2024-34750",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Exceptional Conditions",
          "title": "CWE-755"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673481",
          "CSAFPID-1503596",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1751242",
          "CSAFPID-1751243",
          "CSAFPID-1751079",
          "CSAFPID-1751225",
          "CSAFPID-1751085"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-34750",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673481",
            "CSAFPID-1503596",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1751242",
            "CSAFPID-1751243",
            "CSAFPID-1751079",
            "CSAFPID-1751225",
            "CSAFPID-1751085"
          ]
        }
      ],
      "title": "CVE-2024-34750"
    },
    {
      "cve": "CVE-2024-35195",
      "cwe": {
        "id": "CWE-670",
        "name": "Always-Incorrect Control Flow Implementation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Always-Incorrect Control Flow Implementation",
          "title": "CWE-670"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751246",
          "CSAFPID-1751247",
          "CSAFPID-1751248",
          "CSAFPID-1673530",
          "CSAFPID-1673393",
          "CSAFPID-1751239",
          "CSAFPID-220132",
          "CSAFPID-1751082",
          "CSAFPID-1672767",
          "CSAFPID-1751241",
          "CSAFPID-912079",
          "CSAFPID-916906",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-35195",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751246",
            "CSAFPID-1751247",
            "CSAFPID-1751248",
            "CSAFPID-1673530",
            "CSAFPID-1673393",
            "CSAFPID-1751239",
            "CSAFPID-220132",
            "CSAFPID-1751082",
            "CSAFPID-1672767",
            "CSAFPID-1751241",
            "CSAFPID-912079",
            "CSAFPID-916906",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-35195"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673413",
          "CSAFPID-1673414",
          "CSAFPID-1673396",
          "CSAFPID-1503590",
          "CSAFPID-1673393",
          "CSAFPID-1673395",
          "CSAFPID-1673399",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673392",
          "CSAFPID-1503589",
          "CSAFPID-1673415",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1751237",
          "CSAFPID-1751254",
          "CSAFPID-1751217",
          "CSAFPID-1673481",
          "CSAFPID-1751255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37370",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673413",
            "CSAFPID-1673414",
            "CSAFPID-1673396",
            "CSAFPID-1503590",
            "CSAFPID-1673393",
            "CSAFPID-1673395",
            "CSAFPID-1673399",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673392",
            "CSAFPID-1503589",
            "CSAFPID-1673415",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1751237",
            "CSAFPID-1751254",
            "CSAFPID-1751217",
            "CSAFPID-1673481",
            "CSAFPID-1751255"
          ]
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673413",
          "CSAFPID-1673414",
          "CSAFPID-1673396",
          "CSAFPID-1503590",
          "CSAFPID-1673393",
          "CSAFPID-1673395",
          "CSAFPID-1673399",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673392",
          "CSAFPID-1503589",
          "CSAFPID-1673415",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1751237",
          "CSAFPID-1751254",
          "CSAFPID-1751217",
          "CSAFPID-1673481",
          "CSAFPID-1751255",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37371",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673413",
            "CSAFPID-1673414",
            "CSAFPID-1673396",
            "CSAFPID-1503590",
            "CSAFPID-1673393",
            "CSAFPID-1673395",
            "CSAFPID-1673399",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673392",
            "CSAFPID-1503589",
            "CSAFPID-1673415",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1751237",
            "CSAFPID-1751254",
            "CSAFPID-1751217",
            "CSAFPID-1673481",
            "CSAFPID-1751255",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-37891",
      "cwe": {
        "id": "CWE-669",
        "name": "Incorrect Resource Transfer Between Spheres"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Resource Transfer Between Spheres",
          "title": "CWE-669"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1751225",
          "CSAFPID-1751254",
          "CSAFPID-1673530",
          "CSAFPID-1751217",
          "CSAFPID-1751255",
          "CSAFPID-816790",
          "CSAFPID-1751258",
          "CSAFPID-1673481",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1751225",
            "CSAFPID-1751254",
            "CSAFPID-1673530",
            "CSAFPID-1751217",
            "CSAFPID-1751255",
            "CSAFPID-816790",
            "CSAFPID-1751258",
            "CSAFPID-1673481",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38475",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Improper Encoding or Escaping of Output",
          "title": "CWE-116"
        },
        {
          "category": "other",
          "text": "Path Traversal: \u0027.../...//\u0027",
          "title": "CWE-35"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Use of Hard-coded Credentials",
          "title": "CWE-798"
        },
        {
          "category": "other",
          "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
          "title": "CWE-338"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38475",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
        }
      ],
      "title": "CVE-2024-38475"
    },
    {
      "cve": "CVE-2024-38807",
      "cwe": {
        "id": "CWE-347",
        "name": "Improper Verification of Cryptographic Signature"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Verification of Cryptographic Signature",
          "title": "CWE-347"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751090",
          "CSAFPID-1751233",
          "CSAFPID-1751234",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38807",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751090",
            "CSAFPID-1751233",
            "CSAFPID-1751234",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-38807"
    },
    {
      "cve": "CVE-2024-38809",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673393"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38809",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-1673393"
          ]
        }
      ],
      "title": "CVE-2024-38809"
    },
    {
      "cve": "CVE-2024-38816",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "other",
          "text": "Relative Path Traversal",
          "title": "CWE-23"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1751081",
          "CSAFPID-1673393",
          "CSAFPID-1751079",
          "CSAFPID-1751080",
          "CSAFPID-1751084",
          "CSAFPID-1751085",
          "CSAFPID-1751082",
          "CSAFPID-1751225"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38816",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1751081",
            "CSAFPID-1673393",
            "CSAFPID-1751079",
            "CSAFPID-1751080",
            "CSAFPID-1751084",
            "CSAFPID-1751085",
            "CSAFPID-1751082",
            "CSAFPID-1751225"
          ]
        }
      ],
      "title": "CVE-2024-38816"
    },
    {
      "cve": "CVE-2024-38819",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673393",
          "CSAFPID-1751079",
          "CSAFPID-1751080",
          "CSAFPID-1751081",
          "CSAFPID-1751082",
          "CSAFPID-1751084",
          "CSAFPID-1751085",
          "CSAFPID-1751225",
          "CSAFPID-1672767",
          "CSAFPID-1751241"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38819",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673393",
            "CSAFPID-1751079",
            "CSAFPID-1751080",
            "CSAFPID-1751081",
            "CSAFPID-1751082",
            "CSAFPID-1751084",
            "CSAFPID-1751085",
            "CSAFPID-1751225",
            "CSAFPID-1672767",
            "CSAFPID-1751241"
          ]
        }
      ],
      "title": "CVE-2024-38819"
    },
    {
      "cve": "CVE-2024-38820",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Improper Handling of Case Sensitivity",
          "title": "CWE-178"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751079",
          "CSAFPID-1751225",
          "CSAFPID-1751081",
          "CSAFPID-1751084",
          "CSAFPID-1673393",
          "CSAFPID-1751080",
          "CSAFPID-1751082",
          "CSAFPID-1751085",
          "CSAFPID-1672767",
          "CSAFPID-1751241"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38820",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751079",
            "CSAFPID-1751225",
            "CSAFPID-1751081",
            "CSAFPID-1751084",
            "CSAFPID-1673393",
            "CSAFPID-1751080",
            "CSAFPID-1751082",
            "CSAFPID-1751085",
            "CSAFPID-1672767",
            "CSAFPID-1751241"
          ]
        }
      ],
      "title": "CVE-2024-38820"
    },
    {
      "cve": "CVE-2024-38827",
      "cwe": {
        "id": "CWE-639",
        "name": "Authorization Bypass Through User-Controlled Key"
      },
      "notes": [
        {
          "category": "other",
          "text": "Authorization Bypass Through User-Controlled Key",
          "title": "CWE-639"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751225",
          "CSAFPID-1751079",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-1673393",
          "CSAFPID-1751085",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38827",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751225",
            "CSAFPID-1751079",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-1673393",
            "CSAFPID-1751085",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-38827"
    },
    {
      "cve": "CVE-2024-38998",
      "cwe": {
        "id": "CWE-1321",
        "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
          "title": "CWE-1321"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751225",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-912073",
          "CSAFPID-1751254",
          "CSAFPID-1751079",
          "CSAFPID-1751242",
          "CSAFPID-1751234",
          "CSAFPID-1673496",
          "CSAFPID-1751233",
          "CSAFPID-1751255",
          "CSAFPID-1673481",
          "CSAFPID-1751085",
          "CSAFPID-220132",
          "CSAFPID-912079"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38998",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751225",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-912073",
            "CSAFPID-1751254",
            "CSAFPID-1751079",
            "CSAFPID-1751242",
            "CSAFPID-1751234",
            "CSAFPID-1673496",
            "CSAFPID-1751233",
            "CSAFPID-1751255",
            "CSAFPID-1673481",
            "CSAFPID-1751085",
            "CSAFPID-220132",
            "CSAFPID-912079"
          ]
        }
      ],
      "title": "CVE-2024-38998"
    },
    {
      "cve": "CVE-2024-38999",
      "cwe": {
        "id": "CWE-1321",
        "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
          "title": "CWE-1321"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751225",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-912073",
          "CSAFPID-1751254",
          "CSAFPID-1751079",
          "CSAFPID-1751242",
          "CSAFPID-1751234",
          "CSAFPID-1673496",
          "CSAFPID-1751233",
          "CSAFPID-1751255",
          "CSAFPID-1673481",
          "CSAFPID-1751085",
          "CSAFPID-220132",
          "CSAFPID-912079"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38999",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751225",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-912073",
            "CSAFPID-1751254",
            "CSAFPID-1751079",
            "CSAFPID-1751242",
            "CSAFPID-1751234",
            "CSAFPID-1673496",
            "CSAFPID-1751233",
            "CSAFPID-1751255",
            "CSAFPID-1673481",
            "CSAFPID-1751085",
            "CSAFPID-220132",
            "CSAFPID-912079"
          ]
        }
      ],
      "title": "CVE-2024-38999"
    },
    {
      "cve": "CVE-2024-41817",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Search Path Element",
          "title": "CWE-427"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673382",
          "CSAFPID-1650731",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-220132",
          "CSAFPID-912079"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-41817",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673382",
            "CSAFPID-1650731",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-220132",
            "CSAFPID-912079"
          ]
        }
      ],
      "title": "CVE-2024-41817"
    },
    {
      "cve": "CVE-2024-45490",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "other",
          "text": "Incorrect Calculation of Buffer Size",
          "title": "CWE-131"
        },
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673382",
          "CSAFPID-1673399",
          "CSAFPID-1650731",
          "CSAFPID-1673517",
          "CSAFPID-1673396",
          "CSAFPID-1673414",
          "CSAFPID-1503590"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45490",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673382",
            "CSAFPID-1673399",
            "CSAFPID-1650731",
            "CSAFPID-1673517",
            "CSAFPID-1673396",
            "CSAFPID-1673414",
            "CSAFPID-1503590"
          ]
        }
      ],
      "title": "CVE-2024-45490"
    },
    {
      "cve": "CVE-2024-45491",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673382",
          "CSAFPID-1673399",
          "CSAFPID-1650731",
          "CSAFPID-1673517",
          "CSAFPID-1673396",
          "CSAFPID-1673414",
          "CSAFPID-1503590"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45491",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673382",
            "CSAFPID-1673399",
            "CSAFPID-1650731",
            "CSAFPID-1673517",
            "CSAFPID-1673396",
            "CSAFPID-1673414",
            "CSAFPID-1503590"
          ]
        }
      ],
      "title": "CVE-2024-45491"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673382",
          "CSAFPID-1673399",
          "CSAFPID-1650731",
          "CSAFPID-1673517",
          "CSAFPID-1673396",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1673414",
          "CSAFPID-1503590"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45492",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673382",
            "CSAFPID-1673399",
            "CSAFPID-1650731",
            "CSAFPID-1673517",
            "CSAFPID-1673396",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1673414",
            "CSAFPID-1503590"
          ]
        }
      ],
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-47535",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751233",
          "CSAFPID-1751234",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47535",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751233",
            "CSAFPID-1751234",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-47535"
    },
    {
      "cve": "CVE-2024-47554",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751292",
          "CSAFPID-1751234",
          "CSAFPID-1751294",
          "CSAFPID-1751233",
          "CSAFPID-1751295",
          "CSAFPID-1751296",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47554",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751292",
            "CSAFPID-1751234",
            "CSAFPID-1751294",
            "CSAFPID-1751233",
            "CSAFPID-1751295",
            "CSAFPID-1751296",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-47554"
    },
    {
      "cve": "CVE-2024-47561",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751296",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47561",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751296",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2024-47561"
    },
    {
      "cve": "CVE-2024-47803",
      "cwe": {
        "id": "CWE-209",
        "name": "Generation of Error Message Containing Sensitive Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Generation of Error Message Containing Sensitive Information",
          "title": "CWE-209"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751079",
          "CSAFPID-1751225",
          "CSAFPID-1672767",
          "CSAFPID-1751300",
          "CSAFPID-1751241",
          "CSAFPID-1751081",
          "CSAFPID-1751084",
          "CSAFPID-1673393",
          "CSAFPID-1751085"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47803",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751079",
            "CSAFPID-1751225",
            "CSAFPID-1672767",
            "CSAFPID-1751300",
            "CSAFPID-1751241",
            "CSAFPID-1751081",
            "CSAFPID-1751084",
            "CSAFPID-1673393",
            "CSAFPID-1751085"
          ]
        }
      ],
      "title": "CVE-2024-47803"
    },
    {
      "cve": "CVE-2024-47804",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        },
        {
          "category": "other",
          "text": "Insufficient Granularity of Access Control",
          "title": "CWE-1220"
        },
        {
          "category": "other",
          "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
          "title": "CWE-843"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751225",
          "CSAFPID-1751079",
          "CSAFPID-1672767",
          "CSAFPID-1751300",
          "CSAFPID-1751241",
          "CSAFPID-1751081",
          "CSAFPID-1751084",
          "CSAFPID-1673393",
          "CSAFPID-1751085"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47804",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751225",
            "CSAFPID-1751079",
            "CSAFPID-1672767",
            "CSAFPID-1751300",
            "CSAFPID-1751241",
            "CSAFPID-1751081",
            "CSAFPID-1751084",
            "CSAFPID-1673393",
            "CSAFPID-1751085"
          ]
        }
      ],
      "title": "CVE-2024-47804"
    },
    {
      "cve": "CVE-2024-49766",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751208",
          "CSAFPID-1751246",
          "CSAFPID-1751209"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-49766",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751208",
            "CSAFPID-1751246",
            "CSAFPID-1751209"
          ]
        }
      ],
      "title": "CVE-2024-49766"
    },
    {
      "cve": "CVE-2024-49767",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751208",
          "CSAFPID-1751080",
          "CSAFPID-1751079",
          "CSAFPID-1751225",
          "CSAFPID-1751082",
          "CSAFPID-1751300",
          "CSAFPID-1751246",
          "CSAFPID-1751209",
          "CSAFPID-1673393",
          "CSAFPID-1751085",
          "CSAFPID-1751231"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-49767",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751208",
            "CSAFPID-1751080",
            "CSAFPID-1751079",
            "CSAFPID-1751225",
            "CSAFPID-1751082",
            "CSAFPID-1751300",
            "CSAFPID-1751246",
            "CSAFPID-1751209",
            "CSAFPID-1673393",
            "CSAFPID-1751085",
            "CSAFPID-1751231"
          ]
        }
      ],
      "title": "CVE-2024-49767"
    },
    {
      "cve": "CVE-2024-50379",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-816790"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50379",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-816790"
          ]
        }
      ],
      "title": "CVE-2024-50379"
    },
    {
      "cve": "CVE-2024-50602",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751225",
          "CSAFPID-1751079",
          "CSAFPID-1751082",
          "CSAFPID-1751085"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50602",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751225",
            "CSAFPID-1751079",
            "CSAFPID-1751082",
            "CSAFPID-1751085"
          ]
        }
      ],
      "title": "CVE-2024-50602"
    },
    {
      "cve": "CVE-2024-53677",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "other",
          "text": "Unrestricted Upload of File with Dangerous Type",
          "title": "CWE-434"
        },
        {
          "category": "other",
          "text": "Files or Directories Accessible to External Parties",
          "title": "CWE-552"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-816790"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-53677",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-816790"
          ]
        }
      ],
      "title": "CVE-2024-53677"
    },
    {
      "cve": "CVE-2024-54677",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-816790"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-54677",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-816790"
          ]
        }
      ],
      "title": "CVE-2024-54677"
    },
    {
      "cve": "CVE-2024-56337",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-816790"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-56337",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-816790"
          ]
        }
      ],
      "title": "CVE-2024-56337"
    },
    {
      "cve": "CVE-2025-21542",
      "product_status": {
        "known_affected": [
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-1673496",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21542",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-1673496",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2025-21542"
    },
    {
      "cve": "CVE-2025-21544",
      "product_status": {
        "known_affected": [
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-1673496",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21544",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-1673496",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2025-21544"
    },
    {
      "cve": "CVE-2025-21554",
      "product_status": {
        "known_affected": [
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-1673496",
          "CSAFPID-1751377",
          "CSAFPID-1751378",
          "CSAFPID-1751379",
          "CSAFPID-1751380",
          "CSAFPID-1751381",
          "CSAFPID-1751382",
          "CSAFPID-1751383",
          "CSAFPID-1674619",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1751384",
          "CSAFPID-1751385",
          "CSAFPID-1751386"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21554",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-1673496",
            "CSAFPID-1751377",
            "CSAFPID-1751378",
            "CSAFPID-1751379",
            "CSAFPID-1751380",
            "CSAFPID-1751381",
            "CSAFPID-1751382",
            "CSAFPID-1751383",
            "CSAFPID-1674619",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1751384",
            "CSAFPID-1751385",
            "CSAFPID-1751386"
          ]
        }
      ],
      "title": "CVE-2025-21554"
    }
  ]
}
  WID-SEC-W-2024-3614
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3614 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3614.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3614 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3614"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin vom 2024-12-04",
        "url": "https://www.ibm.com/support/pages/node/7176902"
      }
    ],
    "source_lang": "en-US",
    "title": "IBM InfoSphere Information Server: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-12-04T23:00:00.000+00:00",
      "generator": {
        "date": "2024-12-05T11:41:07.952+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.10"
        }
      },
      "id": "WID-SEC-W-2024-3614",
      "initial_release_date": "2024-12-04T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-12-04T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c11.7.1.5",
                "product": {
                  "name": "IBM InfoSphere Information Server \u003c11.7.1.5",
                  "product_id": "T039581"
                }
              },
              {
                "category": "product_version",
                "name": "11.7.1.5",
                "product": {
                  "name": "IBM InfoSphere Information Server 11.7.1.5",
                  "product_id": "T039581-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:infosphere_information_server:11.7.1.5"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c11.7.1.5 Microservices tier rollup patch 3",
                "product": {
                  "name": "IBM InfoSphere Information Server \u003c11.7.1.5 Microservices tier rollup patch 3",
                  "product_id": "T039583"
                }
              },
              {
                "category": "product_version",
                "name": "11.7.1.5 Microservices tier rollup patch 3",
                "product": {
                  "name": "IBM InfoSphere Information Server 11.7.1.5 Microservices tier rollup patch 3",
                  "product_id": "T039583-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:infosphere_information_server:11.7.1.5_microservices_tier_rollup_patch_3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "InfoSphere Information Server"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-49766",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in IBM InfoSphere Information Server. Diese Fehler existieren in der Komponente \u201eWerkzeug\u201c wegen einer Pfadumgehung und eines unkontrollierten Ressourcenverbrauchs. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T039581",
          "T039583"
        ]
      },
      "release_date": "2024-12-04T23:00:00.000+00:00",
      "title": "CVE-2024-49766"
    },
    {
      "cve": "CVE-2024-49767",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in IBM InfoSphere Information Server. Diese Fehler existieren in der Komponente \u201eWerkzeug\u201c wegen einer Pfadumgehung und eines unkontrollierten Ressourcenverbrauchs. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T039581",
          "T039583"
        ]
      },
      "release_date": "2024-12-04T23:00:00.000+00:00",
      "title": "CVE-2024-49767"
    }
  ]
}
  wid-sec-w-2024-3614
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3614 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3614.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3614 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3614"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin vom 2024-12-04",
        "url": "https://www.ibm.com/support/pages/node/7176902"
      }
    ],
    "source_lang": "en-US",
    "title": "IBM InfoSphere Information Server: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-12-04T23:00:00.000+00:00",
      "generator": {
        "date": "2024-12-05T11:41:07.952+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.10"
        }
      },
      "id": "WID-SEC-W-2024-3614",
      "initial_release_date": "2024-12-04T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-12-04T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c11.7.1.5",
                "product": {
                  "name": "IBM InfoSphere Information Server \u003c11.7.1.5",
                  "product_id": "T039581"
                }
              },
              {
                "category": "product_version",
                "name": "11.7.1.5",
                "product": {
                  "name": "IBM InfoSphere Information Server 11.7.1.5",
                  "product_id": "T039581-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:infosphere_information_server:11.7.1.5"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c11.7.1.5 Microservices tier rollup patch 3",
                "product": {
                  "name": "IBM InfoSphere Information Server \u003c11.7.1.5 Microservices tier rollup patch 3",
                  "product_id": "T039583"
                }
              },
              {
                "category": "product_version",
                "name": "11.7.1.5 Microservices tier rollup patch 3",
                "product": {
                  "name": "IBM InfoSphere Information Server 11.7.1.5 Microservices tier rollup patch 3",
                  "product_id": "T039583-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:infosphere_information_server:11.7.1.5_microservices_tier_rollup_patch_3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "InfoSphere Information Server"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-49766",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in IBM InfoSphere Information Server. Diese Fehler existieren in der Komponente \u201eWerkzeug\u201c wegen einer Pfadumgehung und eines unkontrollierten Ressourcenverbrauchs. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T039581",
          "T039583"
        ]
      },
      "release_date": "2024-12-04T23:00:00.000+00:00",
      "title": "CVE-2024-49766"
    },
    {
      "cve": "CVE-2024-49767",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in IBM InfoSphere Information Server. Diese Fehler existieren in der Komponente \u201eWerkzeug\u201c wegen einer Pfadumgehung und eines unkontrollierten Ressourcenverbrauchs. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder vertrauliche Informationen offenzulegen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T039581",
          "T039583"
        ]
      },
      "release_date": "2024-12-04T23:00:00.000+00:00",
      "title": "CVE-2024-49767"
    }
  ]
}
  rhsa-2024:10852
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated images are now available for Red Hat OpenShift AI.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Release of RHOAI 2.16.0 provides these changes:",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:10852",
        "url": "https://access.redhat.com/errata/RHSA-2024:10852"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
        "url": "https://docs.redhat.com/en/documentation/red_hat_openshift_ai/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-49767",
        "url": "https://access.redhat.com/security/cve/CVE-2024-49767"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-3596",
        "url": "https://access.redhat.com/security/cve/CVE-2024-3596"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-24786",
        "url": "https://access.redhat.com/security/cve/CVE-2024-24786"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-10963",
        "url": "https://access.redhat.com/security/cve/CVE-2024-10963"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/",
        "url": "https://access.redhat.com/security/updates/classification/"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10852.json"
      }
    ],
    "title": "Red Hat Security Advisory: RHOAI 2.16.0 - Red Hat OpenShift AI",
    "tracking": {
      "current_release_date": "2025-10-31T18:54:34+00:00",
      "generator": {
        "date": "2025-10-31T18:54:34+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2024:10852",
      "initial_release_date": "2024-12-05T14:54:56+00:00",
      "revision_history": [
        {
          "date": "2024-12-05T14:54:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-03-25T20:51:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-31T18:54:34+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift AI 2.16",
                "product": {
                  "name": "Red Hat OpenShift AI 2.16",
                  "product_id": "Red Hat OpenShift AI 2.16",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift_ai:2.16::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift AI"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-codeflare-operator-rhel8@sha256%3A3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733112229"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-dashboard-rhel8@sha256%3Ac2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733133582"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-data-science-pipelines-argo-argoexec-rhel8@sha256%3A0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953924"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256%3Ac5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953924"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-data-science-pipelines-operator-controller-rhel8@sha256%3A4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953816"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-kf-notebook-controller-rhel8@sha256%3A3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953706"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-kuberay-operator-controller-rhel8@sha256%3Aefe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733112196"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-kueue-controller-rhel8@sha256%3A1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733126703"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-api-server-v2-rhel8@sha256%3A4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-driver-rhel8@sha256%3A348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-launcher-rhel8@sha256%3Af1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256%3Aab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256%3A59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954036"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-mlmd-grpc-server-rhel8@sha256%3Ad0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953940"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-mm-rest-proxy-rhel8@sha256%3Ac693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953738"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-model-controller-rhel8@sha256%3A56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953799"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-model-registry-operator-rhel8@sha256%3A1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954095"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-model-registry-rhel8@sha256%3A60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954132"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-modelmesh-runtime-adapter-rhel8@sha256%3A5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953768"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-modelmesh-serving-controller-rhel8@sha256%3A873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953753"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-modelmesh-rhel8@sha256%3A6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732899102"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-notebook-controller-rhel8@sha256%3Af96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732953706"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-operator-bundle@sha256%3A3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733155920"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-rhel8-operator@sha256%3A8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1733155448"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-training-operator-rhel8@sha256%3A68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954151"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-trustyai-service-operator-rhel8@sha256%3Aba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732954483"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-trustyai-service-rhel8@sha256%3Afeebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.16.0-1732898906"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64 as a component of Red Hat OpenShift AI 2.16",
          "product_id": "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.16"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-3596",
      "cwe": {
        "id": "CWE-924",
        "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
      },
      "discovery_date": "2024-02-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2263240"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "freeradius: forgery attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n*  An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-3596"
        },
        {
          "category": "external",
          "summary": "RHBZ#2263240",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596"
        },
        {
          "category": "external",
          "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/",
          "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"
        },
        {
          "category": "external",
          "summary": "https://datatracker.ietf.org/doc/html/rfc2865",
          "url": "https://datatracker.ietf.org/doc/html/rfc2865"
        },
        {
          "category": "external",
          "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf",
          "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf"
        },
        {
          "category": "external",
          "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt",
          "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt"
        },
        {
          "category": "external",
          "summary": "https://www.blastradius.fail/",
          "url": "https://www.blastradius.fail/"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/456537",
          "url": "https://www.kb.cert.org/vuls/id/456537"
        }
      ],
      "release_date": "2024-07-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-12-05T14:54:56+00:00",
          "details": "For Red Hat OpenShift AI 2.16.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:10852"
        },
        {
          "category": "workaround",
          "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "freeradius: forgery attack"
    },
    {
      "cve": "CVE-2024-10963",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2024-11-07T07:38:52.548000+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2324291"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability in pam_access is rated with an Important severity because it directly impacts the integrity of access control mechanisms in secure environments. By allowing hostname spoofing to bypass restrictions intended for specific local TTYs or services, the vulnerability enables attackers with minimal effort to exploit gaps in security policies that rely on access.conf configurations. The potential for unauthorized access is significant, as attackers with root privileges on any networked device can impersonate trusted service names to evade local access controls.\n\nThis vulnerability was introduced in RHEL-9.4 and does not affect previous versions of RHEL-9.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-10963"
        },
        {
          "category": "external",
          "summary": "RHBZ#2324291",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324291"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-10963",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-10963",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10963"
        }
      ],
      "release_date": "2024-11-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-12-05T14:54:56+00:00",
          "details": "For Red Hat OpenShift AI 2.16.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:10852"
        },
        {
          "category": "workaround",
          "details": "To reduce the risk, administrators should ensure that no DNS hostname matches local TTY or service names used in pam_access. Additionally, implement DNSSEC to prevent spoofing of DNS responses. For stronger protection, consider reconfiguring pam_access to only accept fully qualified domain names (FQDNs) in access.conf",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass"
    },
    {
      "cve": "CVE-2024-24786",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2024-03-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2268046"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to ensure the most restrictive setting needed for operational requirements. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, enabling capabilities like excessive CPU usage, long execution times, or processes consuming abnormal amounts of memory. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing infinite loops caused by malformed or unexpected input, such as unbounded user input or unexpected null values that cause loops to never terminate. In the event of successful exploitation, process isolation limits the effect of an infinite loop to a single process rather than allowing it to consume all system resources.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-24786"
        },
        {
          "category": "external",
          "summary": "RHBZ#2268046",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/569356",
          "url": "https://go.dev/cl/569356"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/",
          "url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2024-2611",
          "url": "https://pkg.go.dev/vuln/GO-2024-2611"
        }
      ],
      "release_date": "2024-03-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-12-05T14:54:56+00:00",
          "details": "For Red Hat OpenShift AI 2.16.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:10852"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON"
    },
    {
      "cve": "CVE-2024-49767",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2024-10-25T20:00:37.993073+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2321829"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Werkzueg web application library. Applications using Werkzeug to parse multipart/form-data requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size setting and trigger a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption | CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that help detect excessive resource usage caused by malicious activity or misconfigurations. In the event of exploitation, process isolation ensures workloads run in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
          "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-49767"
        },
        {
          "category": "external",
          "summary": "RHBZ#2321829",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2321829"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-49767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-49767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-49767"
        },
        {
          "category": "external",
          "summary": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee",
          "url": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee"
        },
        {
          "category": "external",
          "summary": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b",
          "url": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b"
        },
        {
          "category": "external",
          "summary": "https://github.com/pallets/werkzeug/releases/tag/3.0.6",
          "url": "https://github.com/pallets/werkzeug/releases/tag/3.0.6"
        },
        {
          "category": "external",
          "summary": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2",
          "url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2"
        }
      ],
      "release_date": "2024-10-25T19:41:35.029000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-12-05T14:54:56+00:00",
          "details": "For Red Hat OpenShift AI 2.16.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:10852"
        },
        {
          "category": "workaround",
          "details": "The Request.max_content_length setting and resource limits provided by deployment software and platforms are available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.",
          "product_ids": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:3fc2da180ef549a8041ebe6a5f5f24869a012a2416c2d3e154b2a5ba9645bf60_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:c2a79db6d2ba9c313640149a55f306e8aa4dc36f3cc24bf554c025503b013644_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:0d5e5f17b2eac616c8f5701f89e7309b35000bb7771c311f8763b7b9d1f174a0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:c5d22d63f967e5cf4bd35488dcf64ce0765a6a2a1070a911f66d7bf6f94f1136_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f7b6a45b4db2861c7e1ea225405ffcac3cf112b8eb9cf5a1c9fa7ffb68f6820_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:efe0ec7e60c371b02f2d8431aab69eb1e2ff6c9c93c83d48f8b5e8a5e8d6e46f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:1fe9fb65f747f217c0f247519b23f702d0dfdb9fb471f99382afa9c25fec3c6f_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:4bc8931d063ab56fc99a62bf5b606e9f99addb61b6c097ee0401f7e31787a123_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:348e66c3e1e3c17106c4f4957c5e7b9bcefec80deb00e4900066262c356bc308_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:f1861c81fbb70c28f408072b1bf1b4b79ae1a19637700c455f8133d191e78e6b_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:ab129822211bc9af41a3a52ff10a88d7349a122d0c4e215c824f4e77437cad5e_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:59aa33eb2adff1533465d89a6b86cb52c1823a4b724cc5fa535445277826ecf6_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:d0e26b14b5c09c23193fbca6409e6a7124baa97138dfc75de17b48241636a4da_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c693bd7449c90b7406ce66652524d575c2b875d5c9f14f7ced79adf9c98d5fcb_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:56df2f7095c98e6aa73caf59bbb088ef0824ce0db6acdd5c3a15df53bfd3dbdd_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:1d348086632e5f94c923f91e40c823ab1c27c3b0abc008e8266abe2fd86062a5_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:60c9d0b547ad4d46cdabeb0dfb0c835c68c43bd34cd83b196155899b93017e38_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:6f1ad9675887881dfaa7a8dd81a36ad86c9148f4882141f74b66b28144a73f29_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5f61cf084b1d79ee1b651f2b1777ff238c3e31eb76eba71ccb33b01c46f8c1af_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:873167913efce726fe05667f2a5d3bbdd4aeedc6db905833c9ec620f39a33bd0_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:f96f5d774a07b8f345ddab253cc2671c92a8ba85dda89bd89e5e3c4f126eca50_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:3e647011ba1561919aaac2c65fe605eff4c64fff4cc229e12490f90dcebf3669_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:8eebdb1fa9004bc34fc637ac6e8f195d0f7b71356714ef495c4c1f89d783eb84_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:68ca253d57a89eedda4bd65486ca480a25dd15ea1f7ff0376a50c7f4a40e1395_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:ba0929d09d596250ce4c35fc8e8ea1a325c35e87cac2fd4106d96573a870db12_amd64",
            "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:feebb0e5015cba9d86d8ebf711c993f958f4cd01a935a136232b64fdd25bec0c_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms"
    }
  ]
}
  rhsa-2025:1448
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated images are now available for Red Hat OpenShift AI.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Release of RHOAI 2.17.0 provides these changes:",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:1448",
        "url": "https://access.redhat.com/errata/RHSA-2025:1448"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
        "url": "https://docs.redhat.com/en/documentation/red_hat_openshift_ai/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-45338",
        "url": "https://access.redhat.com/security/cve/CVE-2024-45338"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-45337",
        "url": "https://access.redhat.com/security/cve/CVE-2024-45337"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-49767",
        "url": "https://access.redhat.com/security/cve/CVE-2024-49767"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-21538",
        "url": "https://access.redhat.com/security/cve/CVE-2024-21538"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-52798",
        "url": "https://access.redhat.com/security/cve/CVE-2024-52798"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2024-55565",
        "url": "https://access.redhat.com/security/cve/CVE-2024-55565"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/",
        "url": "https://access.redhat.com/security/updates/classification/"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1448.json"
      }
    ],
    "title": "Red Hat Security Advisory: RHOAI 2.17.0 - Red Hat OpenShift AI",
    "tracking": {
      "current_release_date": "2025-10-31T12:52:53+00:00",
      "generator": {
        "date": "2025-10-31T12:52:53+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2025:1448",
      "initial_release_date": "2025-02-13T15:51:37+00:00",
      "revision_history": [
        {
          "date": "2025-02-13T15:51:37+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-03-25T20:51:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-31T12:52:53+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift AI 2.17",
                "product": {
                  "name": "Red Hat OpenShift AI 2.17",
                  "product_id": "Red Hat OpenShift AI 2.17",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift_ai:2.17::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift AI"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-codeflare-operator-rhel8@sha256%3Afc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739194355"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-dashboard-rhel8@sha256%3Ae19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739103483"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-data-science-pipelines-argo-argoexec-rhel8@sha256%3Ad78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739206295"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256%3A5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739206295"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-data-science-pipelines-operator-controller-rhel8@sha256%3A913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739196512"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-kf-notebook-controller-rhel8@sha256%3A0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739203102"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-kuberay-operator-controller-rhel8@sha256%3Aba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739206292"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-kueue-controller-rhel8@sha256%3A849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739206288"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-api-server-v2-rhel8@sha256%3A85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739206285"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-driver-rhel8@sha256%3A8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739206285"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-launcher-rhel8@sha256%3A83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739206285"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256%3Ab94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739206285"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256%3A5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739206285"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-mlmd-grpc-server-rhel8@sha256%3Af9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739211132"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-mm-rest-proxy-rhel8@sha256%3Ac2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739102645"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-model-controller-rhel8@sha256%3Af581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739102637"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-model-registry-operator-rhel8@sha256%3A47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739102527"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-model-registry-rhel8@sha256%3A713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739102539"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-modelmesh-runtime-adapter-rhel8@sha256%3A78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739102748"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-modelmesh-serving-controller-rhel8@sha256%3Ad846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739204714"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-modelmesh-rhel8@sha256%3A58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739102856"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-notebook-controller-rhel8@sha256%3A58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739203102"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-operator-bundle@sha256%3A8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739218399"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-rhel8-operator@sha256%3A73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739218005"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-training-operator-rhel8@sha256%3A3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739103772"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-trustyai-service-operator-rhel8@sha256%3Acdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739103162"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64",
                "product": {
                  "name": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64",
                  "product_id": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/odh-trustyai-service-rhel8@sha256%3A9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748?arch=amd64\u0026repository_url=registry.redhat.io/rhoai\u0026tag=v2.17.0-1739102747"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64 as a component of Red Hat OpenShift AI 2.17",
          "product_id": "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
        },
        "product_reference": "registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64",
        "relates_to_product_reference": "Red Hat OpenShift AI 2.17"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-21538",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "discovery_date": "2024-11-08T13:44:29.182678+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2324550"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the cross-spawn package for Node.js. Due to improper input sanitization, an attacker can increase CPU usage and crash the program with a large, specially crafted string.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "cross-spawn: regular expression denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21538"
        },
        {
          "category": "external",
          "summary": "RHBZ#2324550",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324550"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21538",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21538",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21538"
        },
        {
          "category": "external",
          "summary": "https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff",
          "url": "https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff"
        },
        {
          "category": "external",
          "summary": "https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f",
          "url": "https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f"
        },
        {
          "category": "external",
          "summary": "https://github.com/moxystudio/node-cross-spawn/pull/160",
          "url": "https://github.com/moxystudio/node-cross-spawn/pull/160"
        },
        {
          "category": "external",
          "summary": "https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230",
          "url": "https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230"
        }
      ],
      "release_date": "2024-11-08T05:00:04.695000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-13T15:51:37+00:00",
          "details": "For Red Hat OpenShift AI 2.17.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1448"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "cross-spawn: regular expression denial of service"
    },
    {
      "cve": "CVE-2024-45337",
      "cwe": {
        "id": "CWE-285",
        "name": "Improper Authorization"
      },
      "discovery_date": "2024-12-11T19:00:54.247490+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2331720"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the x/crypto/ssh go library. Applications and libraries that misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. For example, an attacker may send public keys A and B and authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B, for which the attacker does not control the private key. The misuse of ServerConfig.PublicKeyCallback may cause an authorization bypass.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is classified as important rather than critical because it does not directly enable unauthorized access but rather introduces a risk of authorization bypass if the application or library misuses the PublicKeyCallback API. The vulnerability relies on incorrect assumptions made by the application when handling the sequence or state of keys provided during SSH authentication. Properly implemented systems that use the Permissions field or avoid relying on external state remain unaffected. Additionally, the vulnerability does not allow direct exploitation to gain control over a system without the presence of insecure logic in the application\u0027s handling of authentication attempts.\n\n\nRed Hat Enterprise Linux(RHEL) 8 \u0026 9 and Red Hat Openshift marked as not affected as it was determined that the problem function `ServerConfig.PublicKeyCallback`, as noted in the CVE-2024-45337 issue, is not called by Podman, Buildah, containers-common, or the gvisor-tap-vsock projects.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-45337"
        },
        {
          "category": "external",
          "summary": "RHBZ#2331720",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331720"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337"
        },
        {
          "category": "external",
          "summary": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909",
          "url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/635315",
          "url": "https://go.dev/cl/635315"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/70779",
          "url": "https://go.dev/issue/70779"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ",
          "url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2024-3321",
          "url": "https://pkg.go.dev/vuln/GO-2024-3321"
        }
      ],
      "release_date": "2024-12-11T18:55:58.506000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-13T15:51:37+00:00",
          "details": "For Red Hat OpenShift AI 2.17.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1448"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto"
    },
    {
      "cve": "CVE-2024-45338",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2024-12-18T21:00:59.938173+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2333122"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-45338"
        },
        {
          "category": "external",
          "summary": "RHBZ#2333122",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/637536",
          "url": "https://go.dev/cl/637536"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/70906",
          "url": "https://go.dev/issue/70906"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
          "url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2024-3333",
          "url": "https://pkg.go.dev/vuln/GO-2024-3333"
        }
      ],
      "release_date": "2024-12-18T20:38:22.660000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-13T15:51:37+00:00",
          "details": "For Red Hat OpenShift AI 2.17.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1448"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
    },
    {
      "cve": "CVE-2024-45339",
      "cwe": {
        "id": "CWE-59",
        "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
      },
      "discovery_date": "2025-01-28T02:00:48.029971+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2342463"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in glog, a logging library. This vulnerability allows an unprivileged attacker to overwrite sensitive files via a symbolic link planted in a widely writable directory, exploiting the log file path predictability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-45339"
        },
        {
          "category": "external",
          "summary": "RHBZ#2342463",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342463"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45339",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339"
        },
        {
          "category": "external",
          "summary": "https://github.com/golang/glog/pull/74",
          "url": "https://github.com/golang/glog/pull/74"
        },
        {
          "category": "external",
          "summary": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2",
          "url": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs",
          "url": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs"
        },
        {
          "category": "external",
          "summary": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File",
          "url": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2025-3372",
          "url": "https://pkg.go.dev/vuln/GO-2025-3372"
        }
      ],
      "release_date": "2025-01-28T01:03:24.105000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-13T15:51:37+00:00",
          "details": "For Red Hat OpenShift AI 2.17.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1448"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog"
    },
    {
      "cve": "CVE-2024-49767",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2024-10-25T20:00:37.993073+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2321829"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Werkzueg web application library. Applications using Werkzeug to parse multipart/form-data requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size setting and trigger a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption | CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that help detect excessive resource usage caused by malicious activity or misconfigurations. In the event of exploitation, process isolation ensures workloads run in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-49767"
        },
        {
          "category": "external",
          "summary": "RHBZ#2321829",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2321829"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-49767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-49767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-49767"
        },
        {
          "category": "external",
          "summary": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee",
          "url": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee"
        },
        {
          "category": "external",
          "summary": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b",
          "url": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b"
        },
        {
          "category": "external",
          "summary": "https://github.com/pallets/werkzeug/releases/tag/3.0.6",
          "url": "https://github.com/pallets/werkzeug/releases/tag/3.0.6"
        },
        {
          "category": "external",
          "summary": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2",
          "url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2"
        }
      ],
      "release_date": "2024-10-25T19:41:35.029000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-13T15:51:37+00:00",
          "details": "For Red Hat OpenShift AI 2.17.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1448"
        },
        {
          "category": "workaround",
          "details": "The Request.max_content_length setting and resource limits provided by deployment software and platforms are available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms"
    },
    {
      "cve": "CVE-2024-52798",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "discovery_date": "2024-12-05T23:00:59.020167+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2330689"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in path-to-regexp. A path-to-regexp turns path strings into regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability exists because of an incomplete fix for CVE-2024-45296.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-52798"
        },
        {
          "category": "external",
          "summary": "RHBZ#2330689",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330689"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-52798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-52798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52798"
        },
        {
          "category": "external",
          "summary": "https://github.com/pillarjs/path-to-regexp/commit/f01c26a013b1889f0c217c643964513acf17f6a4",
          "url": "https://github.com/pillarjs/path-to-regexp/commit/f01c26a013b1889f0c217c643964513acf17f6a4"
        },
        {
          "category": "external",
          "summary": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w",
          "url": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w"
        }
      ],
      "release_date": "2024-12-05T22:45:42.774000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-13T15:51:37+00:00",
          "details": "For Red Hat OpenShift AI 2.17.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1448"
        },
        {
          "category": "workaround",
          "details": "Avoid using two parameters within a single path segment when the separator is not, for example, /:a-:b. Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking.",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x"
    },
    {
      "cve": "CVE-2024-55565",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2024-12-09T02:00:45.255738+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2331063"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 is also a fixed version.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nanoid: nanoid mishandles non-integer values",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
          "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-55565"
        },
        {
          "category": "external",
          "summary": "RHBZ#2331063",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331063"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-55565",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-55565",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55565"
        },
        {
          "category": "external",
          "summary": "https://github.com/ai/nanoid/compare/3.3.7...3.3.8",
          "url": "https://github.com/ai/nanoid/compare/3.3.7...3.3.8"
        },
        {
          "category": "external",
          "summary": "https://github.com/ai/nanoid/pull/510",
          "url": "https://github.com/ai/nanoid/pull/510"
        },
        {
          "category": "external",
          "summary": "https://github.com/ai/nanoid/releases/tag/5.0.9",
          "url": "https://github.com/ai/nanoid/releases/tag/5.0.9"
        }
      ],
      "release_date": "2024-12-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-13T15:51:37+00:00",
          "details": "For Red Hat OpenShift AI 2.17.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/",
          "product_ids": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1448"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:fc6d4c739d6e71fd613aa5ba0821035f0a8e783ea94a411abb82b26a5d79406d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:e19276083d932dad46be57674cadf2757a4eeb5d1e2cc2b4ae650e0c8d2c1b02_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:d78353c90bfbdf943547d5f6e3f547ab02f47836ca2cbf3f101977685bf3e34c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:5895e8a111dcd34e6cfec5ce9f84430164b4f6ee43daf8029d0c3b7eeffdd25c_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:913162d37998b5f5503ea9a6acdd32a03fe1588658ed481027c381feaa298542_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:0b105c6231945f7907424520f53df8ae5cfec9e4dd8fe8894928851e06729917_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:ba1d528589d4ea5288cdb424a84caf2e2ac394105f3343d8cbff299e2f1fb012_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:849977d802846fceb0b642c28db3611a88163b6025de36695205d81162935497_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:85b991f09d439ca1e1df6b490097f587a76a2aaf94cb98f360e513f0d153483a_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:8c3b9c8d8303f45766dea82194cf0d886eeb74bf9055c5aae06c8e78f8d28b04_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:83c2d8f4f66835bd22cfd29f4ae9b57bfacf16393b5080fbbe3057cab90dfdda_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:b94552aa082251c6c7b85d49cd3444a12149b8825473619517fa3edbd1748195_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:5979ff12a1b4b96b307ffc601388c195a5ce49bf53c85b7a9e7da20f6266ff8d_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:f9a98109664adec37649f616f63e86605df2feb6fb9178b37ddeba59f6460930_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:c2995df85c0023ebc43e9dc30a258323353387450af99295fd67b57fb8afc36b_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:f581ada86bbf09e794c9ae100197a7dda618ca1efc344281839801609123902f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:47653dc36a82d1b00f10d03df92aa836be8111c381cdb9caabd3a68829f6d683_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:713025cc0357b2052bec976eb74f2e0ec14c1ea4426c1f1eb78a6331973db7a7_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:58fc4ea5fcabd64c061a4f30259b354ffbcbb8c16ffc442f47404ddd49ffd3c9_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:78e18816a15b2d744a76710523a574f483606646d5e661b58a1d8562dc85526f_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:d846107b3580c8ec623bf7cb131236990d20df91ee5c4b2c53474d18e0e112a1_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:58516cc6ece1c6bfb6c426006b2820333c8be181f7e16471b24f52cb024df6b3_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-operator-bundle@sha256:8894db3352d2c8e666bbd0b93ae36474f6d2dcf1e59c24328de8a95667a45bb0_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:73330b67b6b104e67468463f2de1b029530793fc2df550c70851e6a3575e6307_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:3e6c0ff6036b1feedfae2ddbc287e8dee1ee7f8e69ca7e0b911f77c929c50e53_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:cdf0176ce6a2425ed485e188ae25c83b1accbceed515c426c6101a014b43d837_amd64",
            "Red Hat OpenShift AI 2.17:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:9f5c7f682c534d3d07daceaef8c49c7d03d489f160b0adccdb296c5b9f67b748_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nanoid: nanoid mishandles non-integer values"
    }
  ]
}
  fkie_cve-2024-49767
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee | Patch | |
| security-advisories@github.com | https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f | ||
| security-advisories@github.com | https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b | Patch | |
| security-advisories@github.com | https://github.com/pallets/werkzeug/releases/tag/3.0.6 | Release Notes | |
| security-advisories@github.com | https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250103-0007/ | 
| Vendor | Product | Version | |
|---|---|---|---|
| palletsprojects | quart | * | |
| palletsprojects | werkzeug | * | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:palletsprojects:quart:*:*:*:*:*:python:*:*",
              "matchCriteriaId": "9E539F20-B2D2-42F4-98D4-DB92AAB1741E",
              "versionEndExcluding": "0.19.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FE9673-B294-4203-9C8D-DEF5028AE799",
              "versionEndExcluding": "3.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue."
    },
    {
      "lang": "es",
      "value": "Werkzeug es una librer\u00eda de aplicaciones web de interfaz de puerta de enlace de servidor web. Las aplicaciones que utilizan `werkzeug.formparser.MultiPartParser` correspondiente a una versi\u00f3n de Werkzeug anterior a la 3.0.6 para analizar solicitudes `multipart/form-data` (por ejemplo, todas las aplicaciones Flask) son vulnerables a un ataque de agotamiento de recursos (denegaci\u00f3n de servicio) relativamente simple pero efectivo. Una solicitud de env\u00edo de formulario manipulada espec\u00edficamente puede hacer que el analizador asigne y bloquee de 3 a 8 veces el tama\u00f1o de carga en la memoria principal. No hay un l\u00edmite superior; una sola carga a 1 Gbit/s puede agotar 32 GB de RAM en menos de 60 segundos. La versi\u00f3n 3.0.6 de Werkzeug corrige este problema."
    }
  ],
  "id": "CVE-2024-49767",
  "lastModified": "2025-01-03T12:15:26.257",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 6.9,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-10-25T20:15:04.530",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/pallets/werkzeug/releases/tag/3.0.6"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20250103-0007/"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        },
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Primary"
    }
  ]
}
  suse-su-2024:3810-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for python-Werkzeug",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for python-Werkzeug fixes the following issues:\n\n- CVE-2024-49767: Fixed possible resource exhaustion when parsing file data in forms (bsc#1232449).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-3810,SUSE-SLE-Module-Python3-15-SP5-2024-3810,SUSE-SLE-Module-Python3-15-SP6-2024-3810,openSUSE-SLE-15.5-2024-3810,openSUSE-SLE-15.6-2024-3810",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3810-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:3810-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243810-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:3810-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019716.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232449",
        "url": "https://bugzilla.suse.com/1232449"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49767 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49767/"
      }
    ],
    "title": "Security update for python-Werkzeug",
    "tracking": {
      "current_release_date": "2024-10-30T15:33:52Z",
      "generator": {
        "date": "2024-10-30T15:33:52Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:3810-1",
      "initial_release_date": "2024-10-30T15:33:52Z",
      "revision_history": [
        {
          "date": "2024-10-30T15:33:52Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
                "product": {
                  "name": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
                  "product_id": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Python 3 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Python 3 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-python3:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
                  "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-python3:15:sp6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.6",
                "product": {
                  "name": "openSUSE Leap 15.6",
                  "product_id": "openSUSE Leap 15.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-Werkzeug-2.3.6-150400.6.12.1.noarch"
        },
        "product_reference": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-Werkzeug-2.3.6-150400.6.12.1.noarch"
        },
        "product_reference": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:python311-Werkzeug-2.3.6-150400.6.12.1.noarch"
        },
        "product_reference": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:python311-Werkzeug-2.3.6-150400.6.12.1.noarch"
        },
        "product_reference": "python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-49767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
          "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
          "openSUSE Leap 15.5:python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
          "openSUSE Leap 15.6:python311-Werkzeug-2.3.6-150400.6.12.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49767",
          "url": "https://www.suse.com/security/cve/CVE-2024-49767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232449 for CVE-2024-49767",
          "url": "https://bugzilla.suse.com/1232449"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
            "openSUSE Leap 15.5:python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
            "openSUSE Leap 15.6:python311-Werkzeug-2.3.6-150400.6.12.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
            "openSUSE Leap 15.5:python311-Werkzeug-2.3.6-150400.6.12.1.noarch",
            "openSUSE Leap 15.6:python311-Werkzeug-2.3.6-150400.6.12.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-10-30T15:33:52Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-49767"
    }
  ]
}
  msrc_cve-2024-49767
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2024-49767 Werkzeug possible resource exhaustion when parsing file data in forms - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-49767.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Werkzeug possible resource exhaustion when parsing file data in forms",
    "tracking": {
      "current_release_date": "2024-12-12T00:00:00.000Z",
      "generator": {
        "date": "2025-10-20T02:22:00.580Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2024-49767",
      "initial_release_date": "2024-10-01T07:00:00.000Z",
      "revision_history": [
        {
          "date": "2024-12-07T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2024-12-12T00:00:00.000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added python-werkzeug to CBL-Mariner 2.0\nAdded python-werkzeug to Azure Linux 3.0"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              },
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cazl3 python-werkzeug 3.0.3-2",
                "product": {
                  "name": "\u003cazl3 python-werkzeug 3.0.3-2",
                  "product_id": "5"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 python-werkzeug 3.0.3-2",
                "product": {
                  "name": "azl3 python-werkzeug 3.0.3-2",
                  "product_id": "17600"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 python-werkzeug 2.3.7-3",
                "product": {
                  "name": "\u003ccbl2 python-werkzeug 2.3.7-3",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 python-werkzeug 2.3.7-3",
                "product": {
                  "name": "cbl2 python-werkzeug 2.3.7-3",
                  "product_id": "19837"
                }
              }
            ],
            "category": "product_name",
            "name": "python-werkzeug"
          },
          {
            "category": "product_name",
            "name": "azl3 tensorflow 2.16.1-9",
            "product": {
              "name": "azl3 tensorflow 2.16.1-9",
              "product_id": "4"
            }
          },
          {
            "category": "product_name",
            "name": "azl3 python-tensorboard 2.16.2-6",
            "product": {
              "name": "azl3 python-tensorboard 2.16.2-6",
              "product_id": "3"
            }
          },
          {
            "category": "product_name",
            "name": "cbl2 python-tensorboard 2.11.0-3",
            "product": {
              "name": "cbl2 python-tensorboard 2.11.0-3",
              "product_id": "2"
            }
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 python-werkzeug 3.0.3-2 as a component of Azure Linux 3.0",
          "product_id": "17084-5"
        },
        "product_reference": "5",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 python-werkzeug 3.0.3-2 as a component of Azure Linux 3.0",
          "product_id": "17600-17084"
        },
        "product_reference": "17600",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 python-werkzeug 2.3.7-3 as a component of CBL Mariner 2.0",
          "product_id": "17086-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 python-werkzeug 2.3.7-3 as a component of CBL Mariner 2.0",
          "product_id": "19837-17086"
        },
        "product_reference": "19837",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
          "product_id": "17084-4"
        },
        "product_reference": "4",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 python-tensorboard 2.16.2-6 as a component of Azure Linux 3.0",
          "product_id": "17084-3"
        },
        "product_reference": "3",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 python-tensorboard 2.11.0-3 as a component of CBL Mariner 2.0",
          "product_id": "17086-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17086"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-49767",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "flags": [
        {
          "label": "component_not_present",
          "product_ids": [
            "17084-4",
            "17084-3",
            "17086-2"
          ]
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "GitHub_M",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "17600-17084",
          "19837-17086"
        ],
        "known_affected": [
          "17084-5",
          "17086-1"
        ],
        "known_not_affected": [
          "17084-4",
          "17084-3",
          "17086-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-49767 Werkzeug possible resource exhaustion when parsing file data in forms - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-49767.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-12-07T00:00:00.000Z",
          "details": "3.0.3-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-5"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2024-12-07T00:00:00.000Z",
          "details": "2.3.7-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "environmentalsScore": 0.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "17084-5",
            "17086-1"
          ]
        }
      ],
      "title": "Werkzeug possible resource exhaustion when parsing file data in forms"
    }
  ]
}
  ghsa-q34m-jh98-gwm2
Vulnerability from github
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Applications using Werkzeug to parse multipart/form-data requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the Request.max_form_memory_size setting.
The Request.max_content_length setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.
{
  "affected": [
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c= 3.0.5"
      },
      "package": {
        "ecosystem": "PyPI",
        "name": "Werkzeug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "3.0.6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "Quart"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0.20.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2024-49767"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-400"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2024-10-25T19:44:43Z",
    "nvd_published_at": "2024-10-25T20:15:04Z",
    "severity": "MODERATE"
  },
  "details": "Applications using Werkzeug to parse `multipart/form-data` requests are vulnerable to resource exhaustion. A specially crafted form body can bypass the `Request.max_form_memory_size` setting.\n\n\nThe `Request.max_content_length` setting, as well as resource limits provided by deployment software and platforms, are also available to limit the resources used during a request. This vulnerability does not affect those settings. All three types of limits should be considered and set appropriately when deploying an application.",
  "id": "GHSA-q34m-jh98-gwm2",
  "modified": "2025-01-03T12:30:30Z",
  "published": "2024-10-25T19:44:43Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-49767"
    },
    {
      "type": "WEB",
      "url": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee"
    },
    {
      "type": "WEB",
      "url": "https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f"
    },
    {
      "type": "WEB",
      "url": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/pallets/werkzeug"
    },
    {
      "type": "WEB",
      "url": "https://github.com/pallets/werkzeug/releases/tag/3.0.6"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20250103-0007"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    },
    {
      "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
      "type": "CVSS_V4"
    }
  ],
  "summary": "Werkzeug possible resource exhaustion when parsing file data in forms"
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.