Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-53677 (GCVE-0-2024-53677)
Vulnerability from cvelistv5
- File upload logic is flawed
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache Struts |
Version: 2.0.0 ≤ |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-53677",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-16T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-18T04:55:35.587Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-01-03T12:04:30.841Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20250103-0005/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://repo.maven.apache.org/maven2",
"defaultStatus": "unaffected",
"packageName": "org.apache.struts:struts2-core",
"product": "Apache Struts",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "6.4.0",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eFile upload logic in Apache Struts is flawed.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 6.4.0 at least and \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003emigrate to the new \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://struts.apache.org/core-developers/file-upload\"\u003efile upload mechanism\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. If you are not using an old file upload logic based on\u0026nbsp;\u003cb\u003eFileuploadInterceptor\u003c/b\u003e\u0026nbsp;your application is safe.\u003c/span\u003e\u003c/p\u003eYou can find more details in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cwiki.apache.org/confluence/display/WW/S2-067\"\u003ehttps://cwiki.apache.org/confluence/display/WW/S2-067\u003c/a\u003e"
}
],
"value": "File upload logic in Apache Struts is flawed.\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\u00a0FileuploadInterceptor\u00a0your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067"
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "YES",
"Recovery": "AUTOMATIC",
"Safety": "NEGLIGIBLE",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 9.5,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "RED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "LOW"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "File upload logic is flawed",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-20T15:50:38.224Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
}
],
"source": {
"advisory": "S2-067",
"discovery": "EXTERNAL"
},
"title": "Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2024-53677",
"datePublished": "2024-12-11T15:35:43.389Z",
"dateReserved": "2024-11-21T17:02:02.847Z",
"dateUpdated": "2025-01-03T12:04:30.841Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-53677\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-12-11T16:15:14.593\",\"lastModified\":\"2025-07-15T16:30:19.423\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"File upload logic in Apache Struts is flawed.\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\\n\\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\\n\\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\u00a0FileuploadInterceptor\u00a0your application is safe.\\n\\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067\"},{\"lang\":\"es\",\"value\":\"La l\u00f3gica de carga de archivos es una vulnerabilidad defectuosa en Apache Struts. Este problema afecta a Apache Struts: desde la versi\u00f3n 2.0.0 hasta la 6.4.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 6.4.0, que soluciona el problema. Puede encontrar m\u00e1s detalles en https://cwiki.apache.org/confluence/display/WW/S2-067\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:C/RE:L/U:Red\",\"baseScore\":9.5,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"HIGH\",\"subIntegrityImpact\":\"HIGH\",\"subAvailabilityImpact\":\"HIGH\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NEGLIGIBLE\",\"Automatable\":\"YES\",\"Recovery\":\"AUTOMATIC\",\"valueDensity\":\"CONCENTRATED\",\"vulnerabilityResponseEffort\":\"LOW\",\"providerUrgency\":\"RED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-434\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndExcluding\":\"6.4.0\",\"matchCriteriaId\":\"BAB5D8EE-6237-4CB6-B363-E1B6982E44EE\"}]}]}],\"references\":[{\"url\":\"https://cwiki.apache.org/confluence/display/WW/S2-067\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250103-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250103-0005/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-03T12:04:30.841Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-53677\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-12T15:19:19.829131Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-434\", \"description\": \"CWE-434 Unrestricted Upload of File with Dangerous Type\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-12T15:19:47.605Z\"}}], \"cna\": {\"title\": \"Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks\", \"source\": {\"advisory\": \"S2-067\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NEGLIGIBLE\", \"version\": \"4.0\", \"Recovery\": \"AUTOMATIC\", \"baseScore\": 9.5, \"Automatable\": \"YES\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"valueDensity\": \"CONCENTRATED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red\", \"providerUrgency\": \"RED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"HIGH\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"HIGH\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"HIGH\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Struts\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0\", \"lessThan\": \"6.4.0\", \"versionType\": \"semver\"}], \"packageName\": \"org.apache.struts:struts2-core\", \"collectionURL\": \"https://repo.maven.apache.org/maven2\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://cwiki.apache.org/confluence/display/WW/S2-067\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"File upload logic in Apache Struts is flawed.\\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\\n\\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\\n\\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\\u00a0FileuploadInterceptor\\u00a0your application is safe.\\n\\nYou can find more details in\\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eFile upload logic in Apache Struts is flawed.\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAn attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 6.4.0 at least and \u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003emigrate to the new \u003c/span\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://struts.apache.org/core-developers/file-upload\\\"\u003efile upload mechanism\u003c/a\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e. If you are not using an old file upload logic based on\u0026nbsp;\u003cb\u003eFileuploadInterceptor\u003c/b\u003e\u0026nbsp;your application is safe.\u003c/span\u003e\u003c/p\u003eYou can find more details in\u0026nbsp;\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://cwiki.apache.org/confluence/display/WW/S2-067\\\"\u003ehttps://cwiki.apache.org/confluence/display/WW/S2-067\u003c/a\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"File upload logic is flawed\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2024-12-20T15:50:38.224Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-53677\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-03T12:04:30.841Z\", \"dateReserved\": \"2024-11-21T17:02:02.847Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2024-12-11T15:35:43.389Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
wid-sec-w-2024-3660
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Struts ist ein Framework f\u00fcr Java-Anwendungen auf dem Webserver Apache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache Struts ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3660 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3660.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3660 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3660"
},
{
"category": "external",
"summary": "Apache Struts Security Bulletin vom 2024-12-10",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"category": "external",
"summary": "Internet Storm Center vom 2024-12-16",
"url": "https://isc.sans.edu/diary/31520"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180801 vom 2025-01-13",
"url": "https://www.ibm.com/support/pages/node/7180801"
}
],
"source_lang": "en-US",
"title": "Apache Struts: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2025-01-12T23:00:00.000+00:00",
"generator": {
"date": "2025-01-13T09:08:22.281+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-3660",
"initial_release_date": "2024-12-10T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "2",
"summary": "Aktive Ausnutzung gemeldet"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.4.0",
"product": {
"name": "Apache Struts \u003c6.4.0",
"product_id": "T039777"
}
},
{
"category": "product_version",
"name": "6.4.0",
"product": {
"name": "Apache Struts 6.4.0",
"product_id": "T039777-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:apache:struts:6.4.0"
}
}
}
],
"category": "product_name",
"name": "Struts"
}
],
"category": "vendor",
"name": "Apache"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "8.1.0 \u003cFix Pack 35",
"product": {
"name": "IBM Tivoli Netcool/OMNIbus 8.1.0 \u003cFix Pack 35",
"product_id": "T040116"
}
},
{
"category": "product_version",
"name": "8.1.0 Fix Pack 35",
"product": {
"name": "IBM Tivoli Netcool/OMNIbus 8.1.0 Fix Pack 35",
"product_id": "T040116-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_netcool%2fomnibus:8.1.0__fix_pack_35"
}
}
}
],
"category": "product_name",
"name": "Tivoli Netcool/OMNIbus"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53677",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Apache Struts. Eine Manipulation von Datei Upload Parametern kann zu einem Path Traversal ausgenutzt werden, was unter bestimmten Umst\u00e4nden zum Hochladen einer b\u00f6sartigen Datei f\u00fchren kann. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"T039777",
"T040116"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53677"
}
]
}
CERTFR-2025-AVI-0106
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.x antérieures à 12.0.4 IF2 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.15 | ||
| IBM | Db2 | IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions 3.5 à 4.8 antérieures à v4.8.8 | ||
| IBM | Security QRadar SIEM | QRadar SIEM versions 7.5.0 antérieures à 7.5.0 UP11 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 12.x ant\u00e9rieures \u00e0 12.0.4 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.15",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions 3.5 \u00e0 4.8 ant\u00e9rieures \u00e0 v4.8.8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP11",
"product": {
"name": "Security QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-21469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21469"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2023-51714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51714"
},
{
"name": "CVE-2021-47366",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47366"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2021-21409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21409"
},
{
"name": "CVE-2024-36361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36361"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2019-9641",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9641"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49352"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2020-20703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-20703"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2022-48968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48968"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2019-9638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9638"
},
{
"name": "CVE-2022-49016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49016"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2019-9639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9639"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2019-20444",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20444"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-50130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50130"
},
{
"name": "CVE-2024-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4317"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-31141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31141"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-45769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45769"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2018-20506",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20506"
},
{
"name": "CVE-2018-20346",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20346"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2021-37137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37137"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2022-49003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49003"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2019-9020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9020"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2021-37136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37136"
},
{
"name": "CVE-2019-9023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9023"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-41942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41942"
},
{
"name": "CVE-2021-21295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
},
{
"name": "CVE-2024-45770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45770"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2021-43797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-29736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29736"
},
{
"name": "CVE-2019-9021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9021"
},
{
"name": "CVE-2024-27268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27268"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2019-20478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20478"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-29180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29180"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2019-16869",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16869"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2018-20505",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20505"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2019-20445",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20445"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"initial_release_date": "2025-02-07T00:00:00",
"last_revision_date": "2025-02-07T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0106",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182424",
"url": "https://www.ibm.com/support/pages/node/7182424"
},
{
"published_at": "2025-02-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182335",
"url": "https://www.ibm.com/support/pages/node/7182335"
},
{
"published_at": "2025-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181898",
"url": "https://www.ibm.com/support/pages/node/7181898"
},
{
"published_at": "2025-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181480",
"url": "https://www.ibm.com/support/pages/node/7181480"
},
{
"published_at": "2025-02-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182696",
"url": "https://www.ibm.com/support/pages/node/7182696"
}
]
}
CERTFR-2025-AVI-0401
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Juniper Networks Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions 7.5.0 antérieures à 7.5.0 UP11 IF02 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Secure Analytics versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP11 IF02",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-21469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21469"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4317"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-11218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11218"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2025-1244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1244"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-45769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45769"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2024-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57807"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-45770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45770"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-29736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29736"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-56463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56463"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2024-52337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"initial_release_date": "2025-05-14T00:00:00",
"last_revision_date": "2025-05-30T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0401",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-14T00:00:00.000000"
},
{
"description": "Ajouts des identifiants CVE CVE-2017-9047, CVE-2021-37533, CVE-2023-52922, CVE-2024-11218, CVE-2024-50302, CVE-2024-53197, CVE-2024-56171, CVE-2024-57807, CVE-2024-57979, CVE-2025-0624, CVE-2025-21785, CVE-2025-24813, CVE-2025-24928, CVE-2025-27363 et CVE-2025-27516.",
"revision_date": "2025-05-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Secure Analytics",
"vendor_advisories": [
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA98556",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP11-IF03"
}
]
}
CERTFR-2024-AVI-1066
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Apache Struts. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Struts versions ant\u00e9rieures \u00e0 6.4.0",
"product": {
"name": "Struts",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
}
],
"initial_release_date": "2024-12-11T00:00:00",
"last_revision_date": "2024-12-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1066",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Apache Struts. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Apache Struts",
"vendor_advisories": [
{
"published_at": "2024-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 Apache Struts s2-067",
"url": "https://cwiki.apache.org/confluence/display/WW/s2-067"
}
]
}
CERTFR-2025-AVI-0564
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SAP | NetWeaver | NetWeaver et ABAP Platform (SDCCN) versions ST-PI 2008_1_700, 2008_1_710 et 740 | ||
| SAP | NetWeaver | NetWeaver Application Server ABAP and ABAP Platform versionsAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757 et SAP_BASIS 758 | ||
| SAP | Business Objects Business Intelligence Platform | BusinessObjects Business Intelligence Platform (Web Intelligence) versions ENTERPRISE 430, 2025, 2027, ENTERPRISECLIENTTOOLS 430, 2025 et 2027 | ||
| SAP | NetWeaver | NetWeaver Application Server Java version ENGINEAPI 7.50 | ||
| SAP | NetWeaver | NetWeaver Application Server for ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 | ||
| SAP | Business Warehouse | Business Warehouse and SAP BW/4HANA BEx Tools version DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701 | ||
| SAP | NetWeaver | NetWeaver Enterprise Portal Administration version EP-RUNTIME 7.50 | ||
| SAP | Business Objects Business Intelligence Platform | Business Objects Business Intelligence Platform (CMC) versions ENTERPRISE 430 et 2025 | ||
| SAP | NetWeaver | NetWeaver Enterprise Portal Federated Portal Network version EP-RUNTIME 7.50 | ||
| SAP | NetWeaver | NetWeaver (RFC enabled function module) versions SAP_BW 700, 701, 702, 710, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816, 914 et 916 | ||
| SAP | NetWeaver | NetWeaver Application Server ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 | ||
| SAP | S/4HANA (Private Cloud) | S/4HANA and SAP SCM (Characteristic Propagation) versions SCMAPO 713, 714, S4CORE 102, 103, 104, S4COREOP 105, 106, 107, 108, SCM 700, 701, 702 et 712 | ||
| SAP | N/A | SAPCAR versions SAP_CAR 7.53 et 7.22EXT | ||
| SAP | S/4HANA (Private Cloud) | S/4HANA (Enterprise Event Enablement) versions SAP_GWFND 757 et 758 | ||
| SAP | NetWeaver | NetWeaver ABAP Server and ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 914 et SAP_BASIS 915 | ||
| SAP | NetWeaver | NetWeaver et ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753 et SAP_BASIS 754 | ||
| SAP | NetWeaver | NetWeaver Application Server for Java (Log Viewer) version LMNWABASICAPPS 7.50 | ||
| SAP | NetWeaver | NetWeaver (XML Data Archiving Service) version J2EE-APPS 7.50 | ||
| SAP | Business Objects Business Intelligence Platform | BusinessObjects Content Administrator workbench versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701 | ||
| SAP | N/A | Gateway Client versions SAP_GWFND 752, 753, 754, 755, 756, 757 et 758 | ||
| SAP | N/A | Data Services (DQ Report) versions SBOP_DS_MANAGEMENT_CONSOLE 4.3 et 2025 | ||
| SAP | NetWeaver | NetWeaver Visual Composer version VCBASE 7.50 | ||
| SAP | NetWeaver | NetWeaver Business Warehouse (CCAW application) versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701 | ||
| SAP | N/A | Supplier Relationship Management (Live Auction Cockpit) version SRM_SERVER 7.14 | ||
| SAP | Business Warehouse | Business Warehouse (Business Explorer Web 3.5 loading animation) versions DW4CORE 100, 200, 300, 400, 916, SAP_BW 730, 731, 740, 750, 751, 752, 753, 754, 756, 757 et 758 | ||
| SAP | NetWeaver | NetWeaver Application Server for ABAP versions SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 | ||
| SAP | Business Objects Business Intelligence Platform | BusinessObjects BI Platform Central Management Console Promotion Management Application versions ENTERPRISE 430, 2025 et 2027 | ||
| SAP | Business Warehouse | Business Warehouse et SAP Plug-In Basis versions PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758 et 816 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NetWeaver et ABAP Platform (SDCCN) versions ST-PI 2008_1_700, 2008_1_710 et 740",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server ABAP and ABAP Platform versionsAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757 et SAP_BASIS 758",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "BusinessObjects Business Intelligence Platform (Web Intelligence) versions ENTERPRISE 430, 2025, 2027, ENTERPRISECLIENTTOOLS 430, 2025 et 2027",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server Java version ENGINEAPI 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server for ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Warehouse and SAP BW/4HANA BEx Tools version DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701",
"product": {
"name": "Business Warehouse",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Enterprise Portal Administration version EP-RUNTIME 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Objects Business Intelligence Platform (CMC) versions ENTERPRISE 430 et 2025",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Enterprise Portal Federated Portal Network version EP-RUNTIME 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver (RFC enabled function module) versions SAP_BW 700, 701, 702, 710, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816, 914 et 916",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "S/4HANA and SAP SCM (Characteristic Propagation) versions SCMAPO 713, 714, S4CORE 102, 103, 104, S4COREOP 105, 106, 107, 108, SCM 700, 701, 702 et 712",
"product": {
"name": "S/4HANA (Private Cloud)",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAPCAR versions SAP_CAR 7.53 et 7.22EXT",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "S/4HANA (Enterprise Event Enablement) versions SAP_GWFND 757 et 758",
"product": {
"name": "S/4HANA (Private Cloud)",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver ABAP Server and ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 914 et SAP_BASIS 915",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver et ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753 et SAP_BASIS 754",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server for Java (Log Viewer) version LMNWABASICAPPS 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver (XML Data Archiving Service) version J2EE-APPS 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "BusinessObjects Content Administrator workbench versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Gateway Client versions SAP_GWFND 752, 753, 754, 755, 756, 757 et 758",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Data Services (DQ Report) versions SBOP_DS_MANAGEMENT_CONSOLE 4.3 et 2025",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Visual Composer version VCBASE 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Business Warehouse (CCAW application) versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Supplier Relationship Management (Live Auction Cockpit) version SRM_SERVER 7.14",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Warehouse (Business Explorer Web 3.5 loading animation) versions DW4CORE 100, 200, 300, 400, 916, SAP_BW 730, 731, 740, 750, 751, 752, 753, 754, 756, 757 et 758",
"product": {
"name": "Business Warehouse",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server for ABAP versions SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "BusinessObjects BI Platform Central Management Console Promotion Management Application versions ENTERPRISE 430, 2025 et 2027",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Warehouse et SAP Plug-In Basis versions PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758 et 816",
"product": {
"name": "Business Warehouse",
"vendor": {
"name": "SAP",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-42985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42985"
},
{
"name": "CVE-2025-42968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42968"
},
{
"name": "CVE-2025-42971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42971"
},
{
"name": "CVE-2025-42954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42954"
},
{
"name": "CVE-2025-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42970"
},
{
"name": "CVE-2025-42953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42953"
},
{
"name": "CVE-2025-31326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31326"
},
{
"name": "CVE-2025-42961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42961"
},
{
"name": "CVE-2025-42974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42974"
},
{
"name": "CVE-2025-42978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42978"
},
{
"name": "CVE-2025-30012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30012"
},
{
"name": "CVE-2025-42952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42952"
},
{
"name": "CVE-2025-42981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42981"
},
{
"name": "CVE-2025-42979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42979"
},
{
"name": "CVE-2025-42993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42993"
},
{
"name": "CVE-2025-42959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42959"
},
{
"name": "CVE-2025-42963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42963"
},
{
"name": "CVE-2025-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42969"
},
{
"name": "CVE-2025-42977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42977"
},
{
"name": "CVE-2025-42986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42986"
},
{
"name": "CVE-2025-42966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42966"
},
{
"name": "CVE-2025-30009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30009"
},
{
"name": "CVE-2025-30011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30011"
},
{
"name": "CVE-2025-42962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42962"
},
{
"name": "CVE-2025-42956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42956"
},
{
"name": "CVE-2025-43001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43001"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2025-30010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30010"
},
{
"name": "CVE-2025-42997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42997"
},
{
"name": "CVE-2025-42965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42965"
},
{
"name": "CVE-2025-30018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30018"
},
{
"name": "CVE-2025-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42967"
},
{
"name": "CVE-2025-42980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42980"
},
{
"name": "CVE-2025-42964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42964"
},
{
"name": "CVE-2025-42992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42992"
},
{
"name": "CVE-2025-42973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42973"
},
{
"name": "CVE-2025-42960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42960"
}
],
"initial_release_date": "2025-07-08T00:00:00",
"last_revision_date": "2025-07-08T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0564",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP",
"vendor_advisories": [
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 SAP july-2025",
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html"
}
]
}
cnvd-2024-47916
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/apache/struts/releases
| Name | ['Apache struts >=2.0.0,<=2.3.37(EOL)', 'Apache struts >=2.5.0,<=2.5.33', 'Apache struts >=6.0.0,<=6.3.0.2'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-53677"
}
},
"description": "Apache Struts\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u4e2a\u5f00\u6e90\u9879\u76ee\uff0c\u662f\u4e00\u5957\u7528\u4e8e\u521b\u5efa\u4f01\u4e1a\u7ea7Java Web\u5e94\u7528\u7684\u5f00\u6e90MVC\u6846\u67b6\uff0c\u4e3b\u8981\u63d0\u4f9b\u4e24\u4e2a\u7248\u672c\u6846\u67b6\u4ea7\u54c1\uff0cStruts 1\u548cStruts 2\u3002\n\nApache Struts\u5b58\u5728\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4e0a\u4f20\u6076\u610f\u6587\u4ef6\uff0c\u5bfc\u81f4\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/apache/struts/releases",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-47916",
"openTime": "2024-12-12",
"patchDescription": "Apache Struts\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u4e2a\u5f00\u6e90\u9879\u76ee\uff0c\u662f\u4e00\u5957\u7528\u4e8e\u521b\u5efa\u4f01\u4e1a\u7ea7Java Web\u5e94\u7528\u7684\u5f00\u6e90MVC\u6846\u67b6\uff0c\u4e3b\u8981\u63d0\u4f9b\u4e24\u4e2a\u7248\u672c\u6846\u67b6\u4ea7\u54c1\uff0cStruts 1\u548cStruts 2\u3002\r\n\r\nApache Struts\u5b58\u5728\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4e0a\u4f20\u6076\u610f\u6587\u4ef6\uff0c\u5bfc\u81f4\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apache Struts\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Apache struts \u003e=2.0.0\uff0c\u003c=2.3.37\uff08EOL\uff09",
"Apache struts \u003e=2.5.0\uff0c\u003c=2.5.33",
"Apache struts \u003e=6.0.0\uff0c\u003c=6.3.0.2"
]
},
"referenceLink": "https://cwiki.apache.org/confluence/display/WW/S2-067",
"serverity": "\u9ad8",
"submitTime": "2024-12-12",
"title": "Apache Struts\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e"
}
fkie_cve-2024-53677
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security@apache.org | https://cwiki.apache.org/confluence/display/WW/S2-067 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250103-0005/ | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAB5D8EE-6237-4CB6-B363-E1B6982E44EE",
"versionEndExcluding": "6.4.0",
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File upload logic in Apache Struts is flawed.\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\u00a0FileuploadInterceptor\u00a0your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"lang": "es",
"value": "La l\u00f3gica de carga de archivos es una vulnerabilidad defectuosa en Apache Struts. Este problema afecta a Apache Struts: desde la versi\u00f3n 2.0.0 hasta la 6.4.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 6.4.0, que soluciona el problema. Puede encontrar m\u00e1s detalles en https://cwiki.apache.org/confluence/display/WW/S2-067"
}
],
"id": "CVE-2024-53677",
"lastModified": "2025-07-15T16:30:19.423",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "YES",
"Recovery": "AUTOMATIC",
"Safety": "NEGLIGIBLE",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.5,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "RED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:C/RE:L/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "LOW"
},
"source": "security@apache.org",
"type": "Secondary"
}
]
},
"published": "2024-12-11T16:15:14.593",
"references": [
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20250103-0005/"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
ghsa-43mq-6xmg-29vm
Vulnerability from github
9.5 (Critical) - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red
File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 .
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.struts:struts2-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.4.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-53677"
],
"database_specific": {
"cwe_ids": [
"CWE-22",
"CWE-434",
"CWE-915"
],
"github_reviewed": true,
"github_reviewed_at": "2024-12-11T22:02:54Z",
"nvd_published_at": "2024-12-11T16:15:14Z",
"severity": "CRITICAL"
},
"details": "File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067 .",
"id": "GHSA-43mq-6xmg-29vm",
"modified": "2025-07-15T23:05:23Z",
"published": "2024-12-11T18:30:42Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53677"
},
{
"type": "WEB",
"url": "https://github.com/apache/struts/commit/1ecfbae46543a83e131404f8dcc84b3d0d554854"
},
{
"type": "WEB",
"url": "https://github.com/apache/struts/commit/3ef9ade8902a63bb560892453eeca02bfddefc78"
},
{
"type": "WEB",
"url": "https://github.com/apache/struts/commit/930fef7679d7247db9e460c146b1698a9d7ad1e4"
},
{
"type": "WEB",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/struts"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20250103-0005"
},
{
"type": "WEB",
"url": "https://struts.apache.org/core-developers/file-upload"
},
{
"type": "WEB",
"url": "https://www.dynatrace.com/news/blog/the-anatomy-of-broken-apache-struts-2-a-technical-deep-dive-into-cve-2024-53677"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red",
"type": "CVSS_V4"
}
],
"summary": "Apache Struts file upload logic is flawed"
}
NCSC-2024-0492
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apache heeft een kwetsbaarheid verholpen in Apache Struts (Versies van 2.0.0 tot voor 6.4.0).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheid bevindt zich in de wijze waarop de bestandupload logica is ge\u00efmplementeerd in de verouderde **FileUploadInterceptor**. Deze kwetsbaarheid kan worden misbruikt om willekeurige code op systemen die deze versies draaien uit te voeren. Aangezien de getroffen versies veelvuldig worden gebruikt in verschillende applicaties, kan de impact aanzienlijk zijn.\nApplicaties die gebruik maken van het vernieuwde **ActionFileUploadInterceptor** zijn niet gevoelig voor misbruik.\n",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apache heeft updates uitgebracht om de kwetsbaarheid te verhelpen. Naast het inzetten van de updates moeten applicaties die gebouwd zijn met Struts aangepast worden om gebruik te maken van het nieuwe **ActionFileUploadInterceptor** in plaats van het verouderde **FileUploadInterceptor**. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - certbundde; cveprojectv5; github; nvd; redhat",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"category": "external",
"summary": "Reference - github",
"url": "https://struts.apache.org/core-developers/file-upload"
}
],
"title": "Kwetsbaarheid verholpen in Apache Struts",
"tracking": {
"current_release_date": "2024-12-22T18:38:46.211336Z",
"id": "NCSC-2024-0492",
"initial_release_date": "2024-12-13T10:05:07.992077Z",
"revision_history": [
{
"date": "2024-12-13T10:05:07.992077Z",
"number": "0",
"summary": "Initiele versie"
},
{
"date": "2024-12-22T18:38:46.211336Z",
"number": "1",
"summary": "Additionele oplossing toegevoegd."
}
],
"status": "final",
"version": "1.0.1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "struts",
"product": {
"name": "struts",
"product_id": "CSAFPID-100068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "apache"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-100068"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-100068"
]
}
],
"title": "CVE-2024-53677"
}
]
}
ncsc-2025-0021
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2025-01-22T13:30:50.189632Z",
"id": "NCSC-2025-0021",
"initial_release_date": "2025-01-22T13:30:50.189632Z",
"revision_history": [
{
"date": "2025-01-22T13:30:50.189632Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1727475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications__10.4.0.4",
"product": {
"name": "communications__10.4.0.4",
"product_id": "CSAFPID-1674629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.2",
"product": {
"name": "communications___23.4.2",
"product_id": "CSAFPID-1670442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.3",
"product": {
"name": "communications___23.4.3",
"product_id": "CSAFPID-1635325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.4",
"product": {
"name": "communications___23.4.4",
"product_id": "CSAFPID-1635326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.5",
"product": {
"name": "communications___23.4.5",
"product_id": "CSAFPID-1674645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.6",
"product": {
"name": "communications___23.4.6",
"product_id": "CSAFPID-1674646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___24.2.0",
"product": {
"name": "communications___24.2.0",
"product_id": "CSAFPID-1674644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___7.2.1.0.0",
"product": {
"name": "communications___7.2.1.0.0",
"product_id": "CSAFPID-1670441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.6",
"product": {
"name": "communications___8.6.0.6",
"product_id": "CSAFPID-1635327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.8",
"product": {
"name": "communications___8.6.0.8",
"product_id": "CSAFPID-1635328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.2",
"product": {
"name": "communications___9.0.2",
"product_id": "CSAFPID-1670440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.3",
"product": {
"name": "communications___9.0.3",
"product_id": "CSAFPID-1635329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.1.1.8.0",
"product": {
"name": "communications___9.1.1.8.0",
"product_id": "CSAFPID-1674643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751378",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___12.0.6.0.0",
"product": {
"name": "communications_applications___12.0.6.0.0",
"product_id": "CSAFPID-1674627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___5.5.22",
"product": {
"name": "communications_applications___5.5.22",
"product_id": "CSAFPID-1674626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.3",
"product": {
"name": "communications_applications___6.0.3",
"product_id": "CSAFPID-1674628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.4",
"product": {
"name": "communications_applications___6.0.4",
"product_id": "CSAFPID-1674624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.5",
"product": {
"name": "communications_applications___6.0.5",
"product_id": "CSAFPID-1674625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-816792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-764735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751255",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751254",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-816793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-912557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-764247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1650820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-912556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1751303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1503577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1751300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1650752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1673396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1751253",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-912085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1503578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1751090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1751246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-912068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-1503579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-816772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-912076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1503580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-219838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-611387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-816773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1503581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1503322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1751231",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-912545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-764240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1650751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-912069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-816778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-614517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1503582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1672767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1751241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1673399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751082",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751229",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751230",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-224793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-816794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-342793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1650777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-816350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-1672764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1503588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-40293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751097",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-611413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1751243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-764242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-816780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-912553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-219803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-204622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-219909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-816351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-1751218",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-611595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1673414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-342803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1650778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-816354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-204563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-219776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-765242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-916906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-93781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-220132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-912079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-221118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-1673496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence",
"product": {
"name": "communications_performance_intelligence",
"product_id": "CSAFPID-1503591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-764738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-816355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-912558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751233",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1672762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-342804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-816791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-240600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1650731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-764739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-8984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-219826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-912073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-912080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1673481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-912554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41727",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json"
}
],
"title": "CVE-2022-41727"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5981",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
}
],
"title": "CVE-2023-5981"
},
{
"cve": "CVE-2023-6597",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "other",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6597",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-7256",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7256",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2023-7256"
},
{
"cve": "CVE-2023-29407",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29407",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2023-29407"
},
{
"cve": "CVE-2023-29408",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2023-29408"
},
{
"cve": "CVE-2023-40577",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-40577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2023-40577"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46604",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46604",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
}
],
"title": "CVE-2023-46604"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650777",
"CSAFPID-1650778",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-1442",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1442",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-1442"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2961",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "other",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-7885",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7885",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-7885"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24786",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-24791",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-24791"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27309",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27309",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-27309"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-28835",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28835",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28835"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33599",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33600",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "other",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38807",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38807"
},
{
"cve": "CVE-2024-38809",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1673393"
]
}
],
"title": "CVE-2024-38809"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-41817",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47535"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-47803",
"cwe": {
"id": "CWE-209",
"name": "Generation of Error Message Containing Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47803"
},
{
"cve": "CVE-2024-47804",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47804"
},
{
"cve": "CVE-2024-49766",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49766",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-49766"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49767",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50379",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-50379"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2024-54677",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-54677"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2025-21542",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21542",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21542"
},
{
"cve": "CVE-2025-21544",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21544",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21544"
},
{
"cve": "CVE-2025-21554",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21554"
}
]
}
ncsc-2025-0219
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "SAP heeft kwetsbaarheden verholpen in verschillende producten, waaronder SAP S/4HANA, SAP SCM, en SAP NetWeaver.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten onder andere remote code execution, code injectie, en insecure deserialization, die door aanvallers met gebruikersprivileges kunnen worden misbruikt om schadelijke code te cre\u00ebren of uit te voeren. Dit kan leiden tot ernstige bedreigingen voor de vertrouwelijkheid, integriteit en beschikbaarheid van de getroffen systemen. Specifieke kwetsbaarheden zoals een replay-aanval en privilege-escalatie zijn ook ge\u00efdentificeerd, wat de noodzaak benadrukt voor strikte autorisatiecontroles en monitoring van de systemen. De impact varieert van ongeautoriseerde toegang tot gegevens tot volledige systeemcompromittering.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "SAP heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "general",
"text": "Use of Single-factor Authentication",
"title": "CWE-308"
},
{
"category": "general",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"title": "CWE-80"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - certbundde",
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html"
}
],
"title": "Kwetsbaarheden verholpen in SAP producten",
"tracking": {
"current_release_date": "2025-07-09T08:29:00.474865Z",
"generator": {
"date": "2025-06-05T14:45:00Z",
"engine": {
"name": "V.A.",
"version": "1.1"
}
},
"id": "NCSC-2025-0219",
"initial_release_date": "2025-07-09T08:29:00.474865Z",
"revision_history": [
{
"date": "2025-07-09T08:29:00.474865Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/scmapo713",
"product": {
"name": "vers:unknown/scmapo713",
"product_id": "CSAFPID-2961744"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/103",
"product": {
"name": "vers:unknown/103",
"product_id": "CSAFPID-2961747"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/104",
"product": {
"name": "vers:unknown/104",
"product_id": "CSAFPID-2961748"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/106",
"product": {
"name": "vers:unknown/106",
"product_id": "CSAFPID-2961750"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/107",
"product": {
"name": "vers:unknown/107",
"product_id": "CSAFPID-2961751"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/108",
"product": {
"name": "vers:unknown/108",
"product_id": "CSAFPID-2961752"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2961754"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2961755"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/712",
"product": {
"name": "vers:unknown/712",
"product_id": "CSAFPID-2961756"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/714",
"product": {
"name": "vers:unknown/714",
"product_id": "CSAFPID-2961745"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/s4core102",
"product": {
"name": "vers:unknown/s4core102",
"product_id": "CSAFPID-2961746"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/s4coreop105",
"product": {
"name": "vers:unknown/s4coreop105",
"product_id": "CSAFPID-2961749"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/scm700",
"product": {
"name": "vers:unknown/scm700",
"product_id": "CSAFPID-2961753"
}
}
],
"category": "product_name",
"name": "SAP S/4HANA and SAP SCM (Characteristic Propagation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/4core 102",
"product": {
"name": "vers:unknown/4core 102",
"product_id": "CSAFPID-2962518"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/103",
"product": {
"name": "vers:unknown/103",
"product_id": "CSAFPID-2962520"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/104",
"product": {
"name": "vers:unknown/104",
"product_id": "CSAFPID-2962521"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/106",
"product": {
"name": "vers:unknown/106",
"product_id": "CSAFPID-2962522"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/107",
"product": {
"name": "vers:unknown/107",
"product_id": "CSAFPID-2962523"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/108",
"product": {
"name": "vers:unknown/108",
"product_id": "CSAFPID-2962524"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4coreop 105",
"product": {
"name": "vers:unknown/4coreop 105",
"product_id": "CSAFPID-2962519"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2962525"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2962526"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/712",
"product": {
"name": "vers:unknown/712",
"product_id": "CSAFPID-2962527"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/714",
"product": {
"name": "vers:unknown/714",
"product_id": "CSAFPID-2962528"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cm 700",
"product": {
"name": "vers:unknown/cm 700",
"product_id": "CSAFPID-2962529"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cmapo 713",
"product": {
"name": "vers:unknown/cmapo 713",
"product_id": "CSAFPID-2962530"
}
}
],
"category": "product_name",
"name": "S4HANA, SCM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/200",
"product": {
"name": "vers:unknown/200",
"product_id": "CSAFPID-2962567"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/300",
"product": {
"name": "vers:unknown/300",
"product_id": "CSAFPID-2962568"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/400",
"product": {
"name": "vers:unknown/400",
"product_id": "CSAFPID-2962569"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2962570"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2962571"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/731",
"product": {
"name": "vers:unknown/731",
"product_id": "CSAFPID-2962572"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/740",
"product": {
"name": "vers:unknown/740",
"product_id": "CSAFPID-2962573"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/750",
"product": {
"name": "vers:unknown/750",
"product_id": "CSAFPID-2962574"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/751",
"product": {
"name": "vers:unknown/751",
"product_id": "CSAFPID-2962575"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/752",
"product": {
"name": "vers:unknown/752",
"product_id": "CSAFPID-2962576"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/753",
"product": {
"name": "vers:unknown/753",
"product_id": "CSAFPID-2962577"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/754",
"product": {
"name": "vers:unknown/754",
"product_id": "CSAFPID-2962578"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/755",
"product": {
"name": "vers:unknown/755",
"product_id": "CSAFPID-2962579"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/756",
"product": {
"name": "vers:unknown/756",
"product_id": "CSAFPID-2962580"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/757",
"product": {
"name": "vers:unknown/757",
"product_id": "CSAFPID-2962581"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/758",
"product": {
"name": "vers:unknown/758",
"product_id": "CSAFPID-2962582"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/816",
"product": {
"name": "vers:unknown/816",
"product_id": "CSAFPID-2962583"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/dw4core 100",
"product": {
"name": "vers:unknown/dw4core 100",
"product_id": "CSAFPID-2962584"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw 700",
"product": {
"name": "vers:unknown/sap_bw 700",
"product_id": "CSAFPID-2962585"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw_virtual_comp 701",
"product": {
"name": "vers:unknown/sap_bw_virtual_comp 701",
"product_id": "CSAFPID-2962586"
}
}
],
"category": "product_name",
"name": "Business Warehouse, BW-4HANA BEx Tools"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/200",
"product": {
"name": "vers:unknown/200",
"product_id": "CSAFPID-2961658"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/300",
"product": {
"name": "vers:unknown/300",
"product_id": "CSAFPID-2961659"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/400",
"product": {
"name": "vers:unknown/400",
"product_id": "CSAFPID-2961660"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2961662"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2961663"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/731",
"product": {
"name": "vers:unknown/731",
"product_id": "CSAFPID-2961664"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/740",
"product": {
"name": "vers:unknown/740",
"product_id": "CSAFPID-2961665"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/750",
"product": {
"name": "vers:unknown/750",
"product_id": "CSAFPID-2961666"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/751",
"product": {
"name": "vers:unknown/751",
"product_id": "CSAFPID-2961667"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/752",
"product": {
"name": "vers:unknown/752",
"product_id": "CSAFPID-2961668"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/753",
"product": {
"name": "vers:unknown/753",
"product_id": "CSAFPID-2961669"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/754",
"product": {
"name": "vers:unknown/754",
"product_id": "CSAFPID-2961670"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/755",
"product": {
"name": "vers:unknown/755",
"product_id": "CSAFPID-2961671"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/756",
"product": {
"name": "vers:unknown/756",
"product_id": "CSAFPID-2961672"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/757",
"product": {
"name": "vers:unknown/757",
"product_id": "CSAFPID-2961673"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/758",
"product": {
"name": "vers:unknown/758",
"product_id": "CSAFPID-2961674"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/816",
"product": {
"name": "vers:unknown/816",
"product_id": "CSAFPID-2961675"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/dw4core100",
"product": {
"name": "vers:unknown/dw4core100",
"product_id": "CSAFPID-2961657"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw700",
"product": {
"name": "vers:unknown/sap_bw700",
"product_id": "CSAFPID-2961661"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw_virtual_comp701",
"product": {
"name": "vers:unknown/sap_bw_virtual_comp701",
"product_id": "CSAFPID-2961676"
}
}
],
"category": "product_name",
"name": "SAP Business Warehouse and SAP BW/4HANA BEx Tools"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/103",
"product": {
"name": "vers:unknown/103",
"product_id": "CSAFPID-2633874"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/104",
"product": {
"name": "vers:unknown/104",
"product_id": "CSAFPID-2633871"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/106",
"product": {
"name": "vers:unknown/106",
"product_id": "CSAFPID-2633875"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/107",
"product": {
"name": "vers:unknown/107",
"product_id": "CSAFPID-2633870"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/108",
"product": {
"name": "vers:unknown/108",
"product_id": "CSAFPID-2633873"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4core_102",
"product": {
"name": "vers:unknown/4core_102",
"product_id": "CSAFPID-2633872"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4coreop_105",
"product": {
"name": "vers:unknown/4coreop_105",
"product_id": "CSAFPID-2963755"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2844389"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2844388"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/712",
"product": {
"name": "vers:unknown/712",
"product_id": "CSAFPID-2834788"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/714",
"product": {
"name": "vers:unknown/714",
"product_id": "CSAFPID-2834786"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cm_700",
"product": {
"name": "vers:unknown/cm_700",
"product_id": "CSAFPID-2963767"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cmapo_713",
"product": {
"name": "vers:unknown/cmapo_713",
"product_id": "CSAFPID-2963758"
}
}
],
"category": "product_name",
"name": "s/4hana"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/103",
"product": {
"name": "vers:unknown/103",
"product_id": "CSAFPID-2963760"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/104",
"product": {
"name": "vers:unknown/104",
"product_id": "CSAFPID-2963764"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/106",
"product": {
"name": "vers:unknown/106",
"product_id": "CSAFPID-2963756"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/107",
"product": {
"name": "vers:unknown/107",
"product_id": "CSAFPID-2963761"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/108",
"product": {
"name": "vers:unknown/108",
"product_id": "CSAFPID-2963753"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4core_102",
"product": {
"name": "vers:unknown/4core_102",
"product_id": "CSAFPID-2963762"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4coreop_105",
"product": {
"name": "vers:unknown/4coreop_105",
"product_id": "CSAFPID-2963759"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2963754"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2963766"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/712",
"product": {
"name": "vers:unknown/712",
"product_id": "CSAFPID-2963757"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/714",
"product": {
"name": "vers:unknown/714",
"product_id": "CSAFPID-2963752"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cm_700",
"product": {
"name": "vers:unknown/cm_700",
"product_id": "CSAFPID-2963763"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cmapo_713",
"product": {
"name": "vers:unknown/cmapo_713",
"product_id": "CSAFPID-2963765"
}
}
],
"category": "product_name",
"name": "scm"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/7.50",
"product": {
"name": "vers:unknown/7.50",
"product_id": "CSAFPID-2962477"
}
}
],
"category": "product_name",
"name": "NetWeaver Enterprise Portal Federated Portal Network"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/7.50",
"product": {
"name": "vers:unknown/7.50",
"product_id": "CSAFPID-2962517"
}
}
],
"category": "product_name",
"name": "NetWeaver Enterprise Portal Administration"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/j2ee-apps7.50",
"product": {
"name": "vers:unknown/j2ee-apps7.50",
"product_id": "CSAFPID-2961757"
}
}
],
"category": "product_name",
"name": "SAP NetWeaver (XML Data Archiving Service)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/lmnwabasicapps7.50",
"product": {
"name": "vers:unknown/lmnwabasicapps7.50",
"product_id": "CSAFPID-2961721"
}
}
],
"category": "product_name",
"name": "SAP NetWeaver Application Server for Java (Log Viewer )"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 700",
"product": {
"name": "vers:unknown/sap_basis 700",
"product_id": "CSAFPID-2962531"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 701",
"product": {
"name": "vers:unknown/sap_basis 701",
"product_id": "CSAFPID-2962532"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 702",
"product": {
"name": "vers:unknown/sap_basis 702",
"product_id": "CSAFPID-2962533"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 731",
"product": {
"name": "vers:unknown/sap_basis 731",
"product_id": "CSAFPID-2962534"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 740",
"product": {
"name": "vers:unknown/sap_basis 740",
"product_id": "CSAFPID-2962535"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 750",
"product": {
"name": "vers:unknown/sap_basis 750",
"product_id": "CSAFPID-2962536"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 751",
"product": {
"name": "vers:unknown/sap_basis 751",
"product_id": "CSAFPID-2962537"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 752",
"product": {
"name": "vers:unknown/sap_basis 752",
"product_id": "CSAFPID-2962538"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 753",
"product": {
"name": "vers:unknown/sap_basis 753",
"product_id": "CSAFPID-2962539"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 754",
"product": {
"name": "vers:unknown/sap_basis 754",
"product_id": "CSAFPID-2962540"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 755",
"product": {
"name": "vers:unknown/sap_basis 755",
"product_id": "CSAFPID-2962541"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 756",
"product": {
"name": "vers:unknown/sap_basis 756",
"product_id": "CSAFPID-2962542"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 757",
"product": {
"name": "vers:unknown/sap_basis 757",
"product_id": "CSAFPID-2962543"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 758",
"product": {
"name": "vers:unknown/sap_basis 758",
"product_id": "CSAFPID-2962544"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 914",
"product": {
"name": "vers:unknown/sap_basis 914",
"product_id": "CSAFPID-2962545"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 915",
"product": {
"name": "vers:unknown/sap_basis 915",
"product_id": "CSAFPID-2962546"
}
}
],
"category": "product_name",
"name": "NetWeaver ABAP Server, ABAP Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/2027",
"product": {
"name": "vers:unknown/2027",
"product_id": "CSAFPID-2961582"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/enterprise430",
"product": {
"name": "vers:unknown/enterprise430",
"product_id": "CSAFPID-2455796"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/enterpriseclienttools430",
"product": {
"name": "vers:unknown/enterpriseclienttools430",
"product_id": "CSAFPID-2961583"
}
}
],
"category": "product_name",
"name": "SAP BusinessObjects Business Intelligence Platform (Web Intelligence)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/200",
"product": {
"name": "vers:unknown/200",
"product_id": "CSAFPID-2962615"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/300",
"product": {
"name": "vers:unknown/300",
"product_id": "CSAFPID-2962616"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/400",
"product": {
"name": "vers:unknown/400",
"product_id": "CSAFPID-2962617"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2962618"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2962619"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/731",
"product": {
"name": "vers:unknown/731",
"product_id": "CSAFPID-2962620"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/740",
"product": {
"name": "vers:unknown/740",
"product_id": "CSAFPID-2962621"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/750",
"product": {
"name": "vers:unknown/750",
"product_id": "CSAFPID-2962622"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/751",
"product": {
"name": "vers:unknown/751",
"product_id": "CSAFPID-2962623"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/752",
"product": {
"name": "vers:unknown/752",
"product_id": "CSAFPID-2962624"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/753",
"product": {
"name": "vers:unknown/753",
"product_id": "CSAFPID-2962625"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/754",
"product": {
"name": "vers:unknown/754",
"product_id": "CSAFPID-2962626"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/755",
"product": {
"name": "vers:unknown/755",
"product_id": "CSAFPID-2962627"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/756",
"product": {
"name": "vers:unknown/756",
"product_id": "CSAFPID-2962628"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/757",
"product": {
"name": "vers:unknown/757",
"product_id": "CSAFPID-2962629"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/758",
"product": {
"name": "vers:unknown/758",
"product_id": "CSAFPID-2962630"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/816",
"product": {
"name": "vers:unknown/816",
"product_id": "CSAFPID-2962631"
}
}
],
"category": "product_name",
"name": "NetWeaver Business Warehouse"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2905139"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2905140"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/731",
"product": {
"name": "vers:unknown/731",
"product_id": "CSAFPID-2905141"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/740",
"product": {
"name": "vers:unknown/740",
"product_id": "CSAFPID-2905142"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/750",
"product": {
"name": "vers:unknown/750",
"product_id": "CSAFPID-2962587"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/751",
"product": {
"name": "vers:unknown/751",
"product_id": "CSAFPID-2905143"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/752",
"product": {
"name": "vers:unknown/752",
"product_id": "CSAFPID-2905144"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/753",
"product": {
"name": "vers:unknown/753",
"product_id": "CSAFPID-2905145"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/754",
"product": {
"name": "vers:unknown/754",
"product_id": "CSAFPID-2905146"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/755",
"product": {
"name": "vers:unknown/755",
"product_id": "CSAFPID-2905147"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/756",
"product": {
"name": "vers:unknown/756",
"product_id": "CSAFPID-2905148"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/758",
"product": {
"name": "vers:unknown/758",
"product_id": "CSAFPID-2905150"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/757",
"product": {
"name": "vers:unknown/757",
"product_id": "CSAFPID-2905149"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/816",
"product": {
"name": "vers:unknown/816",
"product_id": "CSAFPID-2962588"
}
}
],
"category": "product_name",
"name": "Business Warehouse and Plug-In Basis"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/7.22ext",
"product": {
"name": "vers:unknown/7.22ext",
"product_id": "CSAFPID-2961535"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_ 7.53",
"product": {
"name": "vers:unknown/sap_ 7.53",
"product_id": "CSAFPID-2962481"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_car7.53",
"product": {
"name": "vers:unknown/sap_car7.53",
"product_id": "CSAFPID-2961534"
}
}
],
"category": "product_name",
"name": "SAPCAR"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/dw4core100",
"product": {
"name": "vers:unknown/dw4core100",
"product_id": "CSAFPID-2961678"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw730",
"product": {
"name": "vers:unknown/sap_bw730",
"product_id": "CSAFPID-2961683"
}
}
],
"category": "product_name",
"name": "SAP Business Warehouse (Business Explorer Web 3.5 loading animation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/dw4core 100",
"product": {
"name": "vers:unknown/dw4core 100",
"product_id": "CSAFPID-2962457"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw 700",
"product": {
"name": "vers:unknown/sap_bw 700",
"product_id": "CSAFPID-2962458"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw_virtual_comp 701",
"product": {
"name": "vers:unknown/sap_bw_virtual_comp 701",
"product_id": "CSAFPID-2962459"
}
}
],
"category": "product_name",
"name": "BusinessObjects Content Administrator workbench"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/dw4core_100",
"product": {
"name": "vers:unknown/dw4core_100",
"product_id": "CSAFPID-2962888"
}
}
],
"category": "product_name",
"name": "businessobjects_content_administrator_workbench"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/dw4core100",
"product": {
"name": "vers:unknown/dw4core100",
"product_id": "CSAFPID-2961701"
}
}
],
"category": "product_name",
"name": "SAP BusinessObjects Content Administrator workbench"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/bc-fes-gui8.00",
"product": {
"name": "vers:unknown/bc-fes-gui8.00",
"product_id": "CSAFPID-1987640"
}
}
],
"category": "product_name",
"name": "SAP GUI for Windows"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/sbop_ds_management_console4.3",
"product": {
"name": "vers:unknown/sbop_ds_management_console4.3",
"product_id": "CSAFPID-2961694"
}
}
],
"category": "product_name",
"name": "SAP Data Services (DQ Report)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/st-pi2008_1_700",
"product": {
"name": "vers:unknown/st-pi2008_1_700",
"product_id": "CSAFPID-1987620"
}
}
],
"category": "product_name",
"name": "SAP NetWeaver and ABAP Platform (SDCCN)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/engineapi7.50",
"product": {
"name": "vers:unknown/engineapi7.50",
"product_id": "CSAFPID-2961698"
}
}
],
"category": "product_name",
"name": "SAP NetWeaver Application Server Java"
}
],
"category": "vendor",
"name": "SAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-42967",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42967 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42967.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42967"
},
{
"cve": "CVE-2025-42980",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42980 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42980.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42980"
},
{
"cve": "CVE-2025-42964",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42964 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42964.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42964"
},
{
"cve": "CVE-2025-42966",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42966 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42966.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42966"
},
{
"cve": "CVE-2025-42963",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42963 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42963.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42963"
},
{
"cve": "CVE-2025-42959",
"cwe": {
"id": "CWE-308",
"name": "Use of Single-factor Authentication"
},
"notes": [
{
"category": "other",
"text": "Use of Single-factor Authentication",
"title": "CWE-308"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42959 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42959.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42959"
},
{
"cve": "CVE-2025-42953",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42953 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42953.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42953"
},
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2025-42952",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42952 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42952.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42952"
},
{
"cve": "CVE-2025-43001",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43001 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43001.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-43001"
},
{
"cve": "CVE-2025-42981",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42981 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42981"
},
{
"cve": "CVE-2025-42969",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42969 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42969.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42969"
},
{
"cve": "CVE-2025-42962",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42962"
},
{
"cve": "CVE-2025-42985",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42985 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42985.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42985"
},
{
"cve": "CVE-2025-42970",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42970 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42970"
},
{
"cve": "CVE-2025-42979",
"cwe": {
"id": "CWE-922",
"name": "Insecure Storage of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42979 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42979.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42979"
},
{
"cve": "CVE-2025-42973",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42973 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42973.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42973"
},
{
"cve": "CVE-2025-42968",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42968 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42968.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42968"
},
{
"cve": "CVE-2025-42961",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42961 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42961"
},
{
"cve": "CVE-2025-42960",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42960 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42960.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42960"
},
{
"cve": "CVE-2025-42986",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42986 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42986.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42986"
},
{
"cve": "CVE-2025-42974",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42974 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42974"
},
{
"cve": "CVE-2025-31326",
"cwe": {
"id": "CWE-80",
"name": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"title": "CWE-80"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31326.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-31326"
},
{
"cve": "CVE-2025-42965",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42965 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42965.json"
}
],
"title": "CVE-2025-42965"
},
{
"cve": "CVE-2025-42971",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42971 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42971.json"
}
],
"title": "CVE-2025-42971"
},
{
"cve": "CVE-2025-42978",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42978 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42978.json"
}
],
"title": "CVE-2025-42978"
},
{
"cve": "CVE-2025-42954",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42954 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42954.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42954"
}
]
}
ncsc-2024-0492
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apache heeft een kwetsbaarheid verholpen in Apache Struts (Versies van 2.0.0 tot voor 6.4.0).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheid bevindt zich in de wijze waarop de bestandupload logica is ge\u00efmplementeerd in de verouderde **FileUploadInterceptor**. Deze kwetsbaarheid kan worden misbruikt om willekeurige code op systemen die deze versies draaien uit te voeren. Aangezien de getroffen versies veelvuldig worden gebruikt in verschillende applicaties, kan de impact aanzienlijk zijn.\nApplicaties die gebruik maken van het vernieuwde **ActionFileUploadInterceptor** zijn niet gevoelig voor misbruik.\n",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apache heeft updates uitgebracht om de kwetsbaarheid te verhelpen. Naast het inzetten van de updates moeten applicaties die gebouwd zijn met Struts aangepast worden om gebruik te maken van het nieuwe **ActionFileUploadInterceptor** in plaats van het verouderde **FileUploadInterceptor**. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - certbundde; cveprojectv5; github; nvd; redhat",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"category": "external",
"summary": "Reference - github",
"url": "https://struts.apache.org/core-developers/file-upload"
}
],
"title": "Kwetsbaarheid verholpen in Apache Struts",
"tracking": {
"current_release_date": "2024-12-22T18:38:46.211336Z",
"id": "NCSC-2024-0492",
"initial_release_date": "2024-12-13T10:05:07.992077Z",
"revision_history": [
{
"date": "2024-12-13T10:05:07.992077Z",
"number": "0",
"summary": "Initiele versie"
},
{
"date": "2024-12-22T18:38:46.211336Z",
"number": "1",
"summary": "Additionele oplossing toegevoegd."
}
],
"status": "final",
"version": "1.0.1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "struts",
"product": {
"name": "struts",
"product_id": "CSAFPID-100068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "apache"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-100068"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-100068"
]
}
],
"title": "CVE-2024-53677"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.