Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-56406 (GCVE-0-2024-56406)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-04-13T22:02:35.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/04/13/3" }, { "url": "http://www.openwall.com/lists/oss-security/2025/04/13/4" }, { "url": "http://www.openwall.com/lists/oss-security/2025/04/13/5" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-56406", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-16T14:04:16.993103Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-16T14:04:20.393Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://cpan.org/modules", "defaultStatus": "unaffected", "packageName": "perl", "product": "perl", "programFiles": [ "op.c" ], "programRoutines": [ { "name": "S_pmtrans" }, { "name": "tr" } ], "repo": "https://github.com/Perl/perl5/", "vendor": "perl", "versions": [ { "lessThanOrEqual": "5.41.10", "status": "affected", "version": "5.41.0", "versionType": "custom" }, { "lessThan": "5.40.2-RC1", "status": "affected", "version": "5.39.0", "versionType": "custom" }, { "lessThan": "5.38.4-RC1", "status": "affected", "version": "5.33.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Nathan Mills" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A heap buffer overflow vulnerability was discovered in Perl. \u003cbr\u003e\u003cbr\u003eRelease branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.\u003cbr\u003e\u003cbr\u003eWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\u003cbr\u003e\u003cbr\u003e\u003ctt\u003e\u0026nbsp; \u0026nbsp;$ perl -e \u0027$_ = \"\\x{FF}\" x 1000000; tr/\\xFF/\\x{100}/;\u0027 \u003cbr\u003e\u0026nbsp; \u0026nbsp;Segmentation fault (core dumped)\u003c/tt\u003e\u003cbr\u003e\u003cbr\u003eIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.\u003cbr\u003e\u003cbr\u003e" } ], "value": "A heap buffer overflow vulnerability was discovered in Perl. \n\nRelease branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.\n\nWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\n\n\u00a0 \u00a0$ perl -e \u0027$_ = \"\\x{FF}\" x 1000000; tr/\\xFF/\\x{100}/;\u0027 \n\u00a0 \u00a0Segmentation fault (core dumped)\n\nIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-13T19:29:56.569Z", "orgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "shortName": "CPANSec" }, "references": [ { "tags": [ "patch" ], "url": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch" }, { "tags": [ "release-notes" ], "url": "https://metacpan.org/release/SHAY/perl-5.38.4/changes" }, { "tags": [ "release-notes" ], "url": "https://metacpan.org/release/SHAY/perl-5.40.2/changes" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Users should update perl to 5.40.2 or 5.38.4, or apply the upstream patch provided in the References section.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Users should update perl to 5.40.2 or 5.38.4, or apply the upstream patch provided in the References section." } ], "source": { "discovery": "UNKNOWN" }, "title": "Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "assignerShortName": "CPANSec", "cveId": "CVE-2024-56406", "datePublished": "2025-04-13T13:16:09.841Z", "dateReserved": "2024-12-23T02:07:38.152Z", "dateUpdated": "2025-10-16T14:04:20.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-56406\",\"sourceIdentifier\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\",\"published\":\"2025-04-13T14:15:14.527\",\"lastModified\":\"2025-10-16T14:15:34.083\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap buffer overflow vulnerability was discovered in Perl. \\n\\nRelease branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.\\n\\nWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\\n\\n\u00a0 \u00a0$ perl -e \u0027$_ = \\\"\\\\x{FF}\\\" x 1000000; tr/\\\\xFF/\\\\x{100}/;\u0027 \\n\u00a0 \u00a0Segmentation fault (core dumped)\\n\\nIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer de mont\u00f3n en Perl. Las versiones 5.34, 5.36, 5.38 y 5.40 se ven afectadas, incluyendo las versiones de desarrollo de la 5.33.1 a la 5.41.10. Cuando hay bytes no ASCII en el lado izquierdo del operador `tr`, `S_do_trans_invmap` puede desbordar el puntero de destino `d`. $ perl -e \u0027$_ = \\\"\\\\x{FF}\\\" x 1000000; tr/\\\\xFF/\\\\x{100}/;\u0027 Fallo de segmentaci\u00f3n (volcado de n\u00facleo). Se cree que esta vulnerabilidad puede permitir ataques de denegaci\u00f3n de servicio y, posiblemente, de ejecuci\u00f3n de c\u00f3digo en plataformas que carecen de defensas suficientes.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.33.1\",\"versionEndExcluding\":\"5.38.4\",\"matchCriteriaId\":\"F34096A4-1439-4582-8133-8134388418D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.39.0\",\"versionEndExcluding\":\"5.40.2\",\"matchCriteriaId\":\"91EF91EF-222F-42C0-A506-0A57B98F1DA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.41.0\",\"versionEndIncluding\":\"5.41.10\",\"matchCriteriaId\":\"87807B8D-271E-4B95-ADBC-2383FBD07335\"}]}]}],\"references\":[{\"url\":\"https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\",\"tags\":[\"Patch\"]},{\"url\":\"https://metacpan.org/release/SHAY/perl-5.38.4/changes\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://metacpan.org/release/SHAY/perl-5.40.2/changes\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\",\"tags\":[\"Release Notes\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/04/13/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/04/13/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/04/13/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/04/13/3\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/04/13/4\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/04/13/5\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-04-13T22:02:35.643Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-56406\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-16T14:04:16.993103Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-18T16:48:22.150Z\"}}], \"cna\": {\"title\": \"Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Nathan Mills\"}], \"affected\": [{\"repo\": \"https://github.com/Perl/perl5/\", \"vendor\": \"perl\", \"product\": \"perl\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.41.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.41.10\"}, {\"status\": \"affected\", \"version\": \"5.39.0\", \"lessThan\": \"5.40.2-RC1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"5.33.1\", \"lessThan\": \"5.38.4-RC1\", \"versionType\": \"custom\"}], \"packageName\": \"perl\", \"programFiles\": [\"op.c\"], \"collectionURL\": \"https://cpan.org/modules\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"S_pmtrans\"}, {\"name\": \"tr\"}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Users should update perl to 5.40.2 or 5.38.4, or apply the upstream patch provided in the References section.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Users should update perl to 5.40.2 or 5.38.4, or apply the upstream patch provided in the References section.\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch\", \"tags\": [\"patch\"]}, {\"url\": \"https://metacpan.org/release/SHAY/perl-5.38.4/changes\", \"tags\": [\"release-notes\"]}, {\"url\": \"https://metacpan.org/release/SHAY/perl-5.40.2/changes\", \"tags\": [\"release-notes\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A heap buffer overflow vulnerability was discovered in Perl. \\n\\nRelease branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.\\n\\nWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\\n\\n\\u00a0 \\u00a0$ perl -e \u0027$_ = \\\"\\\\x{FF}\\\" x 1000000; tr/\\\\xFF/\\\\x{100}/;\u0027 \\n\\u00a0 \\u00a0Segmentation fault (core dumped)\\n\\nIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A heap buffer overflow vulnerability was discovered in Perl. \u003cbr\u003e\u003cbr\u003eRelease branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.\u003cbr\u003e\u003cbr\u003eWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\u003cbr\u003e\u003cbr\u003e\u003ctt\u003e\u0026nbsp; \u0026nbsp;$ perl -e \u0027$_ = \\\"\\\\x{FF}\\\" x 1000000; tr/\\\\xFF/\\\\x{100}/;\u0027 \u003cbr\u003e\u0026nbsp; \u0026nbsp;Segmentation fault (core dumped)\u003c/tt\u003e\u003cbr\u003e\u003cbr\u003eIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-122\", \"description\": \"CWE-122 Heap-based Buffer Overflow\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"9b29abf9-4ab0-4765-b253-1875cd9b441e\", \"shortName\": \"CPANSec\", \"dateUpdated\": \"2025-04-13T19:29:56.569Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-56406\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-16T14:04:20.393Z\", \"dateReserved\": \"2024-12-23T02:07:38.152Z\", \"assignerOrgId\": \"9b29abf9-4ab0-4765-b253-1875cd9b441e\", \"datePublished\": \"2025-04-13T13:16:09.841Z\", \"assignerShortName\": \"CPANSec\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-p6jf-pv8c-623c
Vulnerability from github
A heap buffer overflow vulnerability was discovered in Perl.
When there are non-ASCII bytes in the left-hand-side of the tr
operator, S_do_trans_invmap
can overflow the destination pointer d
.
$ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;' Segmentation fault (core dumped)
It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
{ "affected": [], "aliases": [ "CVE-2024-56406" ], "database_specific": { "cwe_ids": [ "CWE-122", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-04-13T14:15:14Z", "severity": "HIGH" }, "details": "A heap buffer overflow vulnerability was discovered in Perl. \n\nWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\n\n\u00a0 \u00a0$ perl -e \u0027$_ = \"\\x{FF}\" x 1000000; tr/\\xFF/\\x{100}/;\u0027 \n\u00a0 \u00a0Segmentation fault (core dumped)\n\nIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.", "id": "GHSA-p6jf-pv8c-623c", "modified": "2025-10-16T15:30:26Z", "published": "2025-04-13T15:30:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56406" }, { "type": "WEB", "url": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch" }, { "type": "WEB", "url": "https://metacpan.org/release/SHAY/perl-5.38.4/changes" }, { "type": "WEB", "url": "https://metacpan.org/release/SHAY/perl-5.40.2/changes" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/04/13/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/04/13/4" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/04/13/5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "type": "CVSS_V3" } ] }
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2019-2126", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2126" }, { "name": "CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "name": "CVE-2019-12900", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12900" }, { "name": "CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "name": "CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "name": "CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "name": "CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "name": "CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "name": "CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "name": "CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "name": "CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "name": "CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "name": "CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "name": "CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "name": "CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "name": "CVE-2021-45943", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45943" }, { "name": "CVE-2021-34141", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34141" }, { "name": "CVE-2022-1941", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1941" }, { "name": "CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "name": "CVE-2022-41862", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41862" }, { "name": "CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "name": "CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "name": "CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2023-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465" }, { "name": "CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "name": "CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "name": "CVE-2022-30580", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580" }, { "name": "CVE-2022-40898", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40898" }, { "name": "CVE-2022-41725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725" }, { "name": "CVE-2022-41724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724" }, { "name": "CVE-2023-24532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532" }, { "name": "CVE-2023-24537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537" }, { "name": "CVE-2023-2455", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2455" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2023-24536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536" }, { "name": "CVE-2023-24538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538" }, { "name": "CVE-2023-1255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255" }, { "name": "CVE-2023-24540", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540" }, { "name": "CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "name": "CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "name": "CVE-2023-2975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404" }, { "name": "CVE-2023-29402", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402" }, { "name": "CVE-2023-29403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403" }, { "name": "CVE-2023-29405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405" }, { "name": "CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "name": "CVE-2023-29409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409" }, { "name": "CVE-2023-29406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406" }, { "name": "CVE-2023-32681", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-4752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4752" }, { "name": "CVE-2023-45853", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2023-5870", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5870" }, { "name": "CVE-2022-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0543" }, { "name": "CVE-2023-4039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039" }, { "name": "CVE-2021-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848" }, { "name": "CVE-2023-4016", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016" }, { "name": "CVE-2023-29383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383" }, { "name": "CVE-2023-6237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237" }, { "name": "CVE-2023-39323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323" }, { "name": "CVE-2023-31484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484" }, { "name": "CVE-2023-24534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2023-39318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318" }, { "name": "CVE-2023-39319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2024-1580", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1580" }, { "name": "CVE-2016-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781" }, { "name": "CVE-2023-39326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326" }, { "name": "CVE-2023-45285", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285" }, { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2023-45289", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45289" }, { "name": "CVE-2023-45290", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45290" }, { "name": "CVE-2024-24783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24783" }, { "name": "CVE-2024-24784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24784" }, { "name": "CVE-2024-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24785" }, { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" }, { "name": "CVE-2024-23807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23807" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2023-5752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "name": "CVE-2024-26458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458" }, { "name": "CVE-2024-26461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2023-4641", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641" }, { "name": "CVE-2024-22365", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365" }, { "name": "CVE-2024-22667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22667" }, { "name": "CVE-2023-6228", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228" }, { "name": "CVE-2023-45287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287" }, { "name": "CVE-2024-24787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24787" }, { "name": "CVE-2024-24788", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24788" }, { "name": "CVE-2024-7348", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7348" }, { "name": "CVE-2023-7008", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2024-24789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789" }, { "name": "CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "name": "CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "name": "CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "name": "CVE-2024-24790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2022-48468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48468" }, { "name": "CVE-2023-48161", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161" }, { "name": "CVE-2024-11168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168" }, { "name": "CVE-2024-10976", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10976" }, { "name": "CVE-2024-10977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10977" }, { "name": "CVE-2024-10978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10978" }, { "name": "CVE-2024-10979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10979" }, { "name": "CVE-2024-10041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041" }, { "name": "CVE-2024-10963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963" }, { "name": "CVE-2025-21490", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21490" }, { "name": "CVE-2025-21491", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21491" }, { "name": "CVE-2025-21497", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21497" }, { "name": "CVE-2025-21500", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21500" }, { "name": "CVE-2025-21501", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21501" }, { "name": "CVE-2025-21503", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21503" }, { "name": "CVE-2025-21505", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21505" }, { "name": "CVE-2025-21519", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21519" }, { "name": "CVE-2025-21522", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21522" }, { "name": "CVE-2025-21523", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523" }, { "name": "CVE-2025-21529", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21529" }, { "name": "CVE-2025-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21540" }, { "name": "CVE-2025-21546", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21546" }, { "name": "CVE-2025-21555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21555" }, { "name": "CVE-2025-21559", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21559" }, { "name": "CVE-2025-0938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938" }, { "name": "CVE-2025-0167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167" }, { "name": "CVE-2024-12797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2025-1094", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1094" }, { "name": "CVE-2022-49043", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043" }, { "name": "CVE-2024-51744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744" }, { "name": "CVE-2024-24791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791" }, { "name": "CVE-2023-24531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24531" }, { "name": "CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "name": "CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "name": "CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2022-42967", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42967" }, { "name": "CVE-2024-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2025-27363", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27363" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2024-55549", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549" }, { "name": "CVE-2024-9287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2024-12133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133" }, { "name": "CVE-2024-12243", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243" }, { "name": "CVE-2024-2236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236" }, { "name": "CVE-2025-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395" }, { "name": "CVE-2025-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390" }, { "name": "CVE-2025-31115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115" }, { "name": "CVE-2012-0880", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0880" }, { "name": "CVE-2017-17507", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17507" }, { "name": "CVE-2017-8806", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8806" }, { "name": "CVE-2018-10126", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10126" }, { "name": "CVE-2018-11205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11205" }, { "name": "CVE-2018-13866", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13866" }, { "name": "CVE-2018-13867", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13867" }, { "name": "CVE-2018-13868", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13868" }, { "name": "CVE-2018-13869", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13869" }, { "name": "CVE-2018-13870", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13870" }, { "name": "CVE-2018-13871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13871" }, { "name": "CVE-2018-13872", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13872" }, { "name": "CVE-2018-13874", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13874" }, { "name": "CVE-2018-13875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13875" }, { "name": "CVE-2018-13876", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13876" }, { "name": "CVE-2018-14031", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14031" }, { "name": "CVE-2018-14033", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14033" }, { "name": "CVE-2018-14034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14034" }, { "name": "CVE-2018-14035", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14035" }, { "name": "CVE-2018-14460", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14460" }, { "name": "CVE-2018-15671", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15671" }, { "name": "CVE-2018-16438", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16438" }, { "name": "CVE-2018-17432", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17432" }, { "name": "CVE-2018-17433", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17433" }, { "name": "CVE-2018-17434", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17434" }, { "name": "CVE-2018-17435", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17435" }, { "name": "CVE-2018-17436", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17436" }, { "name": "CVE-2018-17437", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17437" }, { "name": "CVE-2018-17438", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17438" }, { "name": "CVE-2018-17439", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17439" }, { "name": "CVE-2019-20005", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20005" }, { "name": "CVE-2019-20006", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20006" }, { "name": "CVE-2019-20007", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20007" }, { "name": "CVE-2019-20198", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20198" }, { "name": "CVE-2019-20199", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20199" }, { "name": "CVE-2019-20200", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20200" }, { "name": "CVE-2019-20201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20201" }, { "name": "CVE-2019-20202", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20202" }, { "name": "CVE-2019-6988", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6988" }, { "name": "CVE-2019-8396", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8396" }, { "name": "CVE-2019-8397", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8397" }, { "name": "CVE-2019-8398", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8398" }, { "name": "CVE-2019-9151", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9151" }, { "name": "CVE-2019-9152", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9152" }, { "name": "CVE-2020-10809", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10809" }, { "name": "CVE-2020-10810", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10810" }, { "name": "CVE-2020-10811", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10811" }, { "name": "CVE-2020-10812", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10812" }, { "name": "CVE-2020-18232", "url": "https://www.cve.org/CVERecord?id=CVE-2020-18232" }, { "name": "CVE-2020-18494", "url": "https://www.cve.org/CVERecord?id=CVE-2020-18494" }, { "name": "CVE-2021-26220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26220" }, { "name": "CVE-2021-26221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26221" }, { "name": "CVE-2021-26222", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26222" }, { "name": "CVE-2021-30485", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30485" }, { "name": "CVE-2021-31229", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31229" }, { "name": "CVE-2021-31347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31347" }, { "name": "CVE-2021-31348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31348" }, { "name": "CVE-2021-31598", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31598" }, { "name": "CVE-2021-33430", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33430" }, { "name": "CVE-2021-37501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37501" }, { "name": "CVE-2021-45829", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45829" }, { "name": "CVE-2021-45830", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45830" }, { "name": "CVE-2021-45832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45832" }, { "name": "CVE-2021-45833", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45833" }, { "name": "CVE-2021-46242", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46242" }, { "name": "CVE-2021-46243", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46243" }, { "name": "CVE-2021-46244", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46244" }, { "name": "CVE-2022-25942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25942" }, { "name": "CVE-2022-25972", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25972" }, { "name": "CVE-2022-26061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26061" }, { "name": "CVE-2022-30045", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30045" }, { "name": "CVE-2022-4055", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4055" }, { "name": "CVE-2022-47655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47655" }, { "name": "CVE-2023-0996", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0996" }, { "name": "CVE-2023-29659", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29659" }, { "name": "CVE-2023-32570", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32570" }, { "name": "CVE-2023-39328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39328" }, { "name": "CVE-2023-39329", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39329" }, { "name": "CVE-2023-51792", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51792" }, { "name": "CVE-2023-6879", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6879" }, { "name": "CVE-2024-27304", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27304" }, { "name": "CVE-2024-29157", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29157" }, { "name": "CVE-2024-29158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29158" }, { "name": "CVE-2024-29159", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29159" }, { "name": "CVE-2024-29160", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29160" }, { "name": "CVE-2024-29161", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29161" }, { "name": "CVE-2024-29162", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29162" }, { "name": "CVE-2024-29163", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29163" }, { "name": "CVE-2024-29164", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29164" }, { "name": "CVE-2024-29165", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29165" }, { "name": "CVE-2024-29166", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29166" }, { "name": "CVE-2024-32605", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32605" }, { "name": "CVE-2024-32606", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32606" }, { "name": "CVE-2024-32607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32607" }, { "name": "CVE-2024-32608", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32608" }, { "name": "CVE-2024-32609", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32609" }, { "name": "CVE-2024-32610", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32610" }, { "name": "CVE-2024-32611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32611" }, { "name": "CVE-2024-32612", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32612" }, { "name": "CVE-2024-32613", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32613" }, { "name": "CVE-2024-32614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32614" }, { "name": "CVE-2024-32615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32615" }, { "name": "CVE-2024-32616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32616" }, { "name": "CVE-2024-32617", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32617" }, { "name": "CVE-2024-32618", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32618" }, { "name": "CVE-2024-32619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32619" }, { "name": "CVE-2024-32620", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32620" }, { "name": "CVE-2024-32621", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32621" }, { "name": "CVE-2024-32622", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32622" }, { "name": "CVE-2024-32623", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32623" }, { "name": "CVE-2024-32624", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32624" }, { "name": "CVE-2024-33873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33873" }, { "name": "CVE-2024-33874", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33874" }, { "name": "CVE-2024-33875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33875" }, { "name": "CVE-2024-33876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33876" }, { "name": "CVE-2024-33877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33877" }, { "name": "CVE-2024-34402", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34402" }, { "name": "CVE-2024-34403", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34403" }, { "name": "CVE-2024-38949", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38949" }, { "name": "CVE-2024-38950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38950" }, { "name": "CVE-2024-41996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41996" }, { "name": "CVE-2024-45993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45993" }, { "name": "CVE-2024-46981", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46981" }, { "name": "CVE-2024-49203", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49203" }, { "name": "CVE-2024-5171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5171" }, { "name": "CVE-2024-51741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51741" }, { "name": "CVE-2024-52522", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52522" }, { "name": "CVE-2024-52616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52616" }, { "name": "CVE-2024-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427" }, { "name": "CVE-2024-53920", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53920" }, { "name": "CVE-2024-56378", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56378" }, { "name": "CVE-2024-56406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406" }, { "name": "CVE-2024-56826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56826" }, { "name": "CVE-2024-56827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56827" }, { "name": "CVE-2024-6716", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6716" }, { "name": "CVE-2025-2153", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2153" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-23022", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23022" }, { "name": "CVE-2025-24528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528" }, { "name": "CVE-2025-4802", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802" } ], "initial_release_date": "2025-06-19T00:00:00", "last_revision_date": "2025-06-19T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0524", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-19T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu", "vendor_advisories": [ { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35841", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35844", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35843", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35842", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35846", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35849", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35840", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35847", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35839", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35845", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35848", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848" } ] }
CERTFR-2025-AVI-0546
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
IBM | WebSphere | WebSphere Application Server versions 8.5.x sans les derniers correctifs de sécurité | ||
IBM | WebSphere Service Registry and Repository | WebSphere Service Registry and Repository sans les derniers correctifs de sécurité | ||
IBM | Sterling Connect:Direct | Sterling Connect:Direct Web services versions 6.4.x antérieures à 6.4.0.3 | ||
IBM | WebSphere | WebSphere Application Server versions 9.0.x sans les derniers correctifs de sécurité | ||
IBM | Sterling Connect:Direct | Sterling Connect:Direct Web services versions 6.3.x antérieures à 6.3.0.14 | ||
IBM | Spectrum | Spectrum Protect Plus versions 10.1.x antérieures à 10.1.17.1 | ||
IBM | QRadar | QRadar Hub versions antérieures à 3.8.3 | ||
IBM | AIX | AIX versions 7.3.x sans les derniers correctif de sécurité | ||
IBM | Db2 | DB2 Data Management Console pour CPD versions antérieures à 4.8.7 | ||
IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.17 |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "WebSphere Application Server versions 8.5.x sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "WebSphere", "vendor": { "name": "IBM", "scada": false } } }, { "description": "WebSphere Service Registry and Repository sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "WebSphere Service Registry and Repository", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling Connect:Direct Web services versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.3", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } }, { "description": "WebSphere Application Server versions 9.0.x sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "WebSphere", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling Connect:Direct Web services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.14", "product": { "name": "Sterling Connect:Direct", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.17.1", "product": { "name": "Spectrum", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar Hub versions ant\u00e9rieures \u00e0 3.8.3", "product": { "name": "QRadar", "vendor": { "name": "IBM", "scada": false } } }, { "description": "AIX versions 7.3.x sans les derniers correctif de s\u00e9curit\u00e9", "product": { "name": "AIX", "vendor": { "name": "IBM", "scada": false } } }, { "description": "DB2 Data Management Console pour CPD versions ant\u00e9rieures \u00e0 4.8.7", "product": { "name": "Db2", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.17", "product": { "name": "QRadar Deployment Intelligence App", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-25577", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25577" }, { "name": "CVE-2024-37891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891" }, { "name": "CVE-2025-27516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27516" }, { "name": "CVE-2024-49766", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766" }, { "name": "CVE-2023-23934", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23934" }, { "name": "CVE-2024-34069", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34069" }, { "name": "CVE-2024-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176" }, { "name": "CVE-2020-29651", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29651" }, { "name": "CVE-2024-45590", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590" }, { "name": "CVE-2024-8305", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8305" }, { "name": "CVE-2023-1409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1409" }, { "name": "CVE-2024-45338", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338" }, { "name": "CVE-2024-7553", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7553" }, { "name": "CVE-2024-36124", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36124" }, { "name": "CVE-2024-56406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406" }, { "name": "CVE-2025-27152", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27152" }, { "name": "CVE-2024-22195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195" }, { "name": "CVE-2024-8207", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8207" }, { "name": "CVE-2024-3372", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3372" }, { "name": "CVE-2025-33214", "url": "https://www.cve.org/CVERecord?id=CVE-2025-33214" }, { "name": "CVE-2024-45296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296" }, { "name": "CVE-2023-46136", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46136" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2019-20916", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20916" }, { "name": "CVE-2020-7789", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7789" }, { "name": "CVE-2024-52798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52798" }, { "name": "CVE-2024-49767", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767" }, { "name": "CVE-2025-41232", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41232" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2023-1077", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1077" }, { "name": "CVE-2025-27789", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27789" }, { "name": "CVE-2022-42969", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42969" }, { "name": "CVE-2023-30861", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30861" }, { "name": "CVE-2024-34064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064" }, { "name": "CVE-2023-32681", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681" }, { "name": "CVE-2024-56334", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56334" }, { "name": "CVE-2020-28493", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28493" }, { "name": "CVE-2024-6375", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6375" }, { "name": "CVE-2025-36038", "url": "https://www.cve.org/CVERecord?id=CVE-2025-36038" }, { "name": "CVE-2024-6345", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345" } ], "initial_release_date": "2025-06-27T00:00:00", "last_revision_date": "2025-06-27T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0546", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-27T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": "2025-06-27", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238297", "url": "https://www.ibm.com/support/pages/node/7238297" }, { "published_at": "2025-06-23", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237702", "url": "https://www.ibm.com/support/pages/node/7237702" }, { "published_at": "2025-06-25", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237967", "url": "https://www.ibm.com/support/pages/node/7237967" }, { "published_at": "2025-06-26", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238168", "url": "https://www.ibm.com/support/pages/node/7238168" }, { "published_at": "2025-06-26", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238156", "url": "https://www.ibm.com/support/pages/node/7238156" }, { "published_at": "2025-06-26", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238155", "url": "https://www.ibm.com/support/pages/node/7238155" }, { "published_at": "2025-06-27", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238295", "url": "https://www.ibm.com/support/pages/node/7238295" }, { "published_at": "2025-06-26", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7238159", "url": "https://www.ibm.com/support/pages/node/7238159" } ] }
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2", "product": { "name": "Tanzu Operations Manager", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2021-44832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832" }, { "name": "CVE-2021-45105", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105" }, { "name": "CVE-2021-44228", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "name": "CVE-2013-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1548" }, { "name": "CVE-2015-4779", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4779" }, { "name": "CVE-2015-4780", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4780" }, { "name": "CVE-2015-4787", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4787" }, { "name": "CVE-2015-4790", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4790" }, { "name": "CVE-2015-4778", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4778" }, { "name": "CVE-2015-4782", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4782" }, { "name": "CVE-2015-4789", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4789" }, { "name": "CVE-2015-4764", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4764" }, { "name": "CVE-2015-4783", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4783" }, { "name": "CVE-2015-2583", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2583" }, { "name": "CVE-2015-4781", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4781" }, { "name": "CVE-2015-4776", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4776" }, { "name": "CVE-2015-4786", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4786" }, { "name": "CVE-2015-2656", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2656" }, { "name": "CVE-2015-4788", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4788" }, { "name": "CVE-2015-4785", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4785" }, { "name": "CVE-2015-4754", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4754" }, { "name": "CVE-2015-4775", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4775" }, { "name": "CVE-2015-4777", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4777" }, { "name": "CVE-2015-2640", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2640" }, { "name": "CVE-2015-4774", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4774" }, { "name": "CVE-2015-2626", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2626" }, { "name": "CVE-2015-2624", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2624" }, { "name": "CVE-2015-4784", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4784" }, { "name": "CVE-2015-2654", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2654" }, { "name": "CVE-2017-8046", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8046" }, { "name": "CVE-2018-3280", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3280" }, { "name": "CVE-2018-3137", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3137" }, { "name": "CVE-2018-3285", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3285" }, { "name": "CVE-2018-3182", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3182" }, { "name": "CVE-2018-3186", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3186" }, { "name": "CVE-2018-3195", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3195" }, { "name": "CVE-2018-3286", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3286" }, { "name": "CVE-2018-3170", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3170" }, { "name": "CVE-2018-3279", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3279" }, { "name": "CVE-2018-3212", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3212" }, { "name": "CVE-2018-3203", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3203" }, { "name": "CVE-2018-3145", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3145" }, { "name": "CVE-2019-2530", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2530" }, { "name": "CVE-2019-2436", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2436" }, { "name": "CVE-2019-2539", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2539" }, { "name": "CVE-2019-2494", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2494" }, { "name": "CVE-2019-2535", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2535" }, { "name": "CVE-2019-2533", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2533" }, { "name": "CVE-2019-2495", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2495" }, { "name": "CVE-2019-2513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2513" }, { "name": "CVE-2019-2536", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2536" }, { "name": "CVE-2019-2502", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2502" }, { "name": "CVE-2019-2634", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2634" }, { "name": "CVE-2019-2587", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2587" }, { "name": "CVE-2019-2584", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2584" }, { "name": "CVE-2019-2691", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2691" }, { "name": "CVE-2019-2606", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2606" }, { "name": "CVE-2019-2630", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2630" }, { "name": "CVE-2019-2624", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2624" }, { "name": "CVE-2019-2623", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2623" }, { "name": "CVE-2019-2695", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2695" }, { "name": "CVE-2019-2596", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2596" }, { "name": "CVE-2019-2580", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2580" }, { "name": "CVE-2019-2644", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2644" }, { "name": "CVE-2019-2681", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2681" }, { "name": "CVE-2019-2617", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2617" }, { "name": "CVE-2019-2636", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2636" }, { "name": "CVE-2019-2689", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2689" }, { "name": "CVE-2019-2693", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2693" }, { "name": "CVE-2019-2593", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2593" }, { "name": "CVE-2019-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2625" }, { "name": "CVE-2019-2585", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2585" }, { "name": "CVE-2019-2631", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2631" }, { "name": "CVE-2019-2694", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2694" }, { "name": "CVE-2019-2620", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2620" }, { "name": "CVE-2019-2688", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2688" }, { "name": "CVE-2019-2589", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2589" }, { "name": "CVE-2019-2635", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2635" }, { "name": "CVE-2019-2626", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2626" }, { "name": "CVE-2019-2686", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2686" }, { "name": "CVE-2019-2685", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2685" }, { "name": "CVE-2019-2687", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2687" }, { "name": "CVE-2019-2607", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2607" }, { "name": "CVE-2019-7317", "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317" }, { "name": "CVE-2019-2811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2811" }, { "name": "CVE-2019-2740", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2740" }, { "name": "CVE-2019-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2879" }, { "name": "CVE-2019-2808", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2808" }, { "name": "CVE-2019-2738", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2738" }, { "name": "CVE-2019-2819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2819" }, { "name": "CVE-2019-2737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2737" }, { "name": "CVE-2019-2814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2814" }, { "name": "CVE-2019-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2778" }, { "name": "CVE-2019-2822", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2822" }, { "name": "CVE-2019-2802", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2802" }, { "name": "CVE-2019-2803", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2803" }, { "name": "CVE-2019-2752", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2752" }, { "name": "CVE-2019-2826", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2826" }, { "name": "CVE-2019-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2784" }, { "name": "CVE-2019-2789", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2789" }, { "name": "CVE-2019-2801", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2801" }, { "name": "CVE-2019-2791", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2791" }, { "name": "CVE-2019-2798", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2798" }, { "name": "CVE-2019-2796", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2796" }, { "name": "CVE-2019-2815", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2815" }, { "name": "CVE-2019-2810", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2810" }, { "name": "CVE-2019-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2780" }, { "name": "CVE-2019-2758", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2758" }, { "name": "CVE-2019-2757", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2757" }, { "name": "CVE-2019-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2785" }, { "name": "CVE-2019-2747", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2747" }, { "name": "CVE-2019-2741", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2741" }, { "name": "CVE-2019-2830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2830" }, { "name": "CVE-2019-2834", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2834" }, { "name": "CVE-2019-2743", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2743" }, { "name": "CVE-2019-2739", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2739" }, { "name": "CVE-2019-2805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2805" }, { "name": "CVE-2019-2797", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2797" }, { "name": "CVE-2019-2774", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2774" }, { "name": "CVE-2019-2795", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2795" }, { "name": "CVE-2019-2746", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2746" }, { "name": "CVE-2019-2812", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2812" }, { "name": "CVE-2019-2924", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2924" }, { "name": "CVE-2019-2914", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2914" }, { "name": "CVE-2019-2960", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2960" }, { "name": "CVE-2019-2923", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2923" }, { "name": "CVE-2019-2968", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2968" }, { "name": "CVE-2019-2993", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2993" }, { "name": "CVE-2019-3009", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3009" }, { "name": "CVE-2019-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2969" }, { "name": "CVE-2019-3011", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3011" }, { "name": "CVE-2019-2967", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2967" }, { "name": "CVE-2019-2946", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2946" }, { "name": "CVE-2019-2966", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2966" }, { "name": "CVE-2019-2957", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2957" }, { "name": "CVE-2019-2948", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2948" }, { "name": "CVE-2019-2922", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2922" }, { "name": "CVE-2019-3004", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3004" }, { "name": "CVE-2019-2998", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2998" }, { "name": "CVE-2019-2911", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2911" }, { "name": "CVE-2019-2950", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2950" }, { "name": "CVE-2019-2910", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2910" }, { "name": "CVE-2019-3018", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3018" }, { "name": "CVE-2019-2974", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2974" }, { "name": "CVE-2019-2991", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2991" }, { "name": "CVE-2019-2997", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2997" }, { "name": "CVE-2019-2938", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2938" }, { "name": "CVE-2019-3003", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3003" }, { "name": "CVE-2019-2982", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2982" }, { "name": "CVE-2019-2963", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2963" }, { "name": "CVE-2020-2579", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2579" }, { "name": "CVE-2020-2584", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2584" }, { "name": "CVE-2020-2577", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2577" }, { "name": "CVE-2020-2679", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2679" }, { "name": "CVE-2020-2570", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2570" }, { "name": "CVE-2020-2572", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2572" }, { "name": "CVE-2020-2627", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2627" }, { "name": "CVE-2020-2660", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2660" }, { "name": "CVE-2020-2589", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2589" }, { "name": "CVE-2020-2573", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2573" }, { "name": "CVE-2020-2686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2686" }, { "name": "CVE-2020-2694", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2694" }, { "name": "CVE-2020-2574", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2574" }, { "name": "CVE-2020-2770", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2770" }, { "name": "CVE-2020-2925", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2925" }, { "name": "CVE-2020-2853", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2853" }, { "name": "CVE-2020-2774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2774" }, { "name": "CVE-2020-2928", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2928" }, { "name": "CVE-2020-2897", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2897" }, { "name": "CVE-2020-2812", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2812" }, { "name": "CVE-2020-2765", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2765" }, { "name": "CVE-2020-2761", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2761" }, { "name": "CVE-2020-2790", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2790" }, { "name": "CVE-2020-2752", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2752" }, { "name": "CVE-2020-2904", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2904" }, { "name": "CVE-2020-2893", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2893" }, { "name": "CVE-2020-2760", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2760" }, { "name": "CVE-2020-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2780" }, { "name": "CVE-2020-2903", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2903" }, { "name": "CVE-2020-2924", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2924" }, { "name": "CVE-2020-2806", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2806" }, { "name": "CVE-2020-2922", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2922" }, { "name": "CVE-2020-2901", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2901" }, { "name": "CVE-2020-2926", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2926" }, { "name": "CVE-2020-2923", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2923" }, { "name": "CVE-2020-2921", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2921" }, { "name": "CVE-2020-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2779" }, { "name": "CVE-2020-2892", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2892" }, { "name": "CVE-2020-2896", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2896" }, { "name": "CVE-2020-2804", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2804" }, { "name": "CVE-2020-2895", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2895" }, { "name": "CVE-2020-2930", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2930" }, { "name": "CVE-2020-2814", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2814" }, { "name": "CVE-2020-2759", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2759" }, { "name": "CVE-2020-2763", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2763" }, { "name": "CVE-2020-14550", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14550" }, { "name": "CVE-2020-14567", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14567" }, { "name": "CVE-2020-14559", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14559" }, { "name": "CVE-2020-14576", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14576" }, { "name": "CVE-2020-14540", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14540" }, { "name": "CVE-2020-14547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14547" }, { "name": "CVE-2020-14553", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14553" }, { "name": "CVE-2020-14539", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14539" }, { "name": "CVE-2020-14845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14845" }, { "name": "CVE-2020-14799", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14799" }, { "name": "CVE-2020-14793", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14793" }, { "name": "CVE-2020-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14888" }, { "name": "CVE-2020-14790", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14790" }, { "name": "CVE-2020-14789", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14789" }, { "name": "CVE-2020-14672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14672" }, { "name": "CVE-2020-14846", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14846" }, { "name": "CVE-2020-14771", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14771" }, { "name": "CVE-2020-14873", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14873" }, { "name": "CVE-2020-14791", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14791" }, { "name": "CVE-2020-14769", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14769" }, { "name": "CVE-2020-14844", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14844" }, { "name": "CVE-2020-14809", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14809" }, { "name": "CVE-2020-14860", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14860" }, { "name": "CVE-2020-14866", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14866" }, { "name": "CVE-2020-14861", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14861" }, { "name": "CVE-2020-14773", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14773" }, { "name": "CVE-2020-14776", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14776" }, { "name": "CVE-2020-14852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14852" }, { "name": "CVE-2020-14760", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14760" }, { "name": "CVE-2020-14870", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14870" }, { "name": "CVE-2020-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14837" }, { "name": "CVE-2020-14893", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14893" }, { "name": "CVE-2020-14836", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14836" }, { "name": "CVE-2020-14829", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14829" }, { "name": "CVE-2020-14868", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14868" }, { "name": "CVE-2020-14827", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14827" }, { "name": "CVE-2020-14839", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14839" }, { "name": "CVE-2020-14777", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14777" }, { "name": "CVE-2020-14812", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14812" }, { "name": "CVE-2020-14775", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14775" }, { "name": "CVE-2020-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14838" }, { "name": "CVE-2020-14869", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14869" }, { "name": "CVE-2020-14765", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14765" }, { "name": "CVE-2020-14814", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14814" }, { "name": "CVE-2020-14821", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14821" }, { "name": "CVE-2020-14830", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14830" }, { "name": "CVE-2020-14828", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14828" }, { "name": "CVE-2020-14804", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14804" }, { "name": "CVE-2020-14800", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14800" }, { "name": "CVE-2020-14891", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14891" }, { "name": "CVE-2020-14848", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14848" }, { "name": "CVE-2020-14867", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14867" }, { "name": "CVE-2020-14785", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14785" }, { "name": "CVE-2020-14794", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14794" }, { "name": "CVE-2020-14786", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14786" }, { "name": "CVE-2020-15358", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15358" }, { "name": "CVE-2020-1971", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971" }, { "name": "CVE-2021-2010", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2010" }, { "name": "CVE-2021-2001", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2001" }, { "name": "CVE-2021-2060", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2060" }, { "name": "CVE-2021-2014", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2014" }, { "name": "CVE-2021-2032", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2032" }, { "name": "CVE-2021-2036", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2036" }, { "name": "CVE-2021-2007", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2007" }, { "name": "CVE-2021-2011", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2011" }, { "name": "CVE-2021-2022", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2022" }, { "name": "CVE-2019-25013", "url": "https://www.cve.org/CVERecord?id=CVE-2019-25013" }, { "name": "CVE-2021-2308", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2308" }, { "name": "CVE-2021-2213", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2213" }, { "name": "CVE-2021-2172", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2172" }, { "name": "CVE-2021-2293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2293" }, { "name": "CVE-2021-2208", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2208" }, { "name": "CVE-2021-2196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2196" }, { "name": "CVE-2021-2194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194" }, { "name": "CVE-2021-2298", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2298" }, { "name": "CVE-2021-2162", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162" }, { "name": "CVE-2021-2179", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179" }, { "name": "CVE-2021-2307", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307" }, { "name": "CVE-2021-2217", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2217" }, { "name": "CVE-2021-2180", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180" }, { "name": "CVE-2021-2203", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2203" }, { "name": "CVE-2021-2144", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144" }, { "name": "CVE-2021-2226", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226" }, { "name": "CVE-2021-2232", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2232" }, { "name": "CVE-2021-2169", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169" }, { "name": "CVE-2021-2301", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2301" }, { "name": "CVE-2021-2202", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202" }, { "name": "CVE-2021-2166", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166" }, { "name": "CVE-2021-2174", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174" }, { "name": "CVE-2021-2154", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154" }, { "name": "CVE-2021-2193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2193" }, { "name": "CVE-2021-2300", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2300" }, { "name": "CVE-2021-2299", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2299" }, { "name": "CVE-2021-2212", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2212" }, { "name": "CVE-2021-2178", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178" }, { "name": "CVE-2021-2146", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146" }, { "name": "CVE-2021-2230", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2230" }, { "name": "CVE-2021-2278", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2278" }, { "name": "CVE-2021-2164", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2164" }, { "name": "CVE-2021-2201", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2201" }, { "name": "CVE-2021-2170", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2170" }, { "name": "CVE-2021-2304", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2304" }, { "name": "CVE-2021-2160", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160" }, { "name": "CVE-2021-2171", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171" }, { "name": "CVE-2021-2305", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2305" }, { "name": "CVE-2021-2215", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2215" }, { "name": "CVE-2021-25214", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25214" }, { "name": "CVE-2012-6153", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6153" }, { "name": "CVE-2020-10878", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10878" }, { "name": "CVE-2021-2370", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2370" }, { "name": "CVE-2021-2389", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389" }, { "name": "CVE-2021-2444", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2444" }, { "name": "CVE-2021-2429", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2429" }, { "name": "CVE-2021-2426", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2426" }, { "name": "CVE-2021-2427", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2427" }, { "name": "CVE-2021-2339", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2339" }, { "name": "CVE-2021-2425", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2425" }, { "name": "CVE-2021-2387", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2387" }, { "name": "CVE-2021-2383", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2383" }, { "name": "CVE-2021-2372", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372" }, { "name": "CVE-2021-2399", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2399" }, { "name": "CVE-2021-2384", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2384" }, { "name": "CVE-2021-2412", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2412" }, { "name": "CVE-2021-2441", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2441" }, { "name": "CVE-2021-2410", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2410" }, { "name": "CVE-2021-2342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342" }, { "name": "CVE-2021-2437", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2437" }, { "name": "CVE-2021-2417", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2417" }, { "name": "CVE-2021-2424", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2424" }, { "name": "CVE-2021-2385", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385" }, { "name": "CVE-2021-2357", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2357" }, { "name": "CVE-2021-2352", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2352" }, { "name": "CVE-2021-2402", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2402" }, { "name": "CVE-2021-2440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2440" }, { "name": "CVE-2021-2340", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2340" }, { "name": "CVE-2021-2390", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390" }, { "name": "CVE-2021-2374", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2374" }, { "name": "CVE-2021-2356", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2356" }, { "name": "CVE-2021-2411", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2411" }, { "name": "CVE-2021-2418", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2418" }, { "name": "CVE-2021-2367", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2367" }, { "name": "CVE-2021-2354", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2354" }, { "name": "CVE-2021-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2422" }, { "name": "CVE-2020-10543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10543" }, { "name": "CVE-2020-12723", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12723" }, { "name": "CVE-2020-10029", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10029" }, { "name": "CVE-2021-23337", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337" }, { "name": "CVE-2020-28500", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28500" }, { "name": "CVE-2019-18276", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18276" }, { "name": "CVE-2021-3421", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3421" }, { "name": "CVE-2021-3326", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3326" }, { "name": "CVE-2019-2708", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2708" }, { "name": "CVE-2020-27618", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27618" }, { "name": "CVE-2021-35640", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35640" }, { "name": "CVE-2021-35626", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35626" }, { "name": "CVE-2021-2478", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2478" }, { "name": "CVE-2021-35624", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35624" }, { "name": "CVE-2021-35583", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35583" }, { "name": "CVE-2021-35628", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35628" }, { "name": "CVE-2021-35630", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35630" }, { "name": "CVE-2021-35644", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35644" }, { "name": "CVE-2021-2479", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2479" }, { "name": "CVE-2021-35638", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35638" }, { "name": "CVE-2021-35646", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35646" }, { "name": "CVE-2021-35596", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35596" }, { "name": "CVE-2021-35643", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35643" }, { "name": "CVE-2021-35637", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35637" }, { "name": "CVE-2021-35623", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35623" }, { "name": "CVE-2021-35632", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35632" }, { "name": "CVE-2021-35641", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35641" }, { "name": "CVE-2021-35604", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35604" }, { "name": "CVE-2021-35636", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35636" }, { "name": "CVE-2021-35546", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35546" }, { "name": "CVE-2021-35627", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35627" }, { "name": "CVE-2021-35625", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35625" }, { "name": "CVE-2021-35608", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35608" }, { "name": "CVE-2021-35597", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35597" }, { "name": "CVE-2021-35537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35537" }, { "name": "CVE-2021-2481", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2481" }, { "name": "CVE-2021-35622", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35622" }, { "name": "CVE-2021-35610", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35610" }, { "name": "CVE-2021-35633", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35633" }, { "name": "CVE-2021-35634", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35634" }, { "name": "CVE-2021-35629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35629" }, { "name": "CVE-2021-35631", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35631" }, { "name": "CVE-2021-35645", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35645" }, { "name": "CVE-2021-35647", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35647" }, { "name": "CVE-2021-35612", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35612" }, { "name": "CVE-2021-35639", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35639" }, { "name": "CVE-2021-35648", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35648" }, { "name": "CVE-2021-35607", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35607" }, { "name": "CVE-2021-35602", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35602" }, { "name": "CVE-2021-35577", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35577" }, { "name": "CVE-2021-35642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35642" }, { "name": "CVE-2021-35575", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35575" }, { "name": "CVE-2021-35635", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35635" }, { "name": "CVE-2021-35591", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35591" }, { "name": "CVE-2021-25219", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25219" }, { "name": "CVE-2021-3875", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3875" }, { "name": "CVE-2019-10744", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10744" }, { "name": "CVE-2022-21352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21352" }, { "name": "CVE-2022-21304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21304" }, { "name": "CVE-2022-21254", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21254" }, { "name": "CVE-2022-21265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21265" }, { "name": "CVE-2022-21348", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21348" }, { "name": "CVE-2022-21372", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21372" }, { "name": "CVE-2022-21245", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21245" }, { "name": "CVE-2022-21368", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21368" }, { "name": "CVE-2022-21339", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21339" }, { "name": "CVE-2022-21264", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21264" }, { "name": "CVE-2022-21297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21297" }, { "name": "CVE-2022-21379", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21379" }, { "name": "CVE-2022-21253", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21253" }, { "name": "CVE-2022-21301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21301" }, { "name": "CVE-2022-21378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21378" }, { "name": "CVE-2022-21370", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21370" }, { "name": "CVE-2022-21302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21302" }, { "name": "CVE-2022-21249", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21249" }, { "name": "CVE-2022-21344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21344" }, { "name": "CVE-2022-21270", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21270" }, { "name": "CVE-2022-21367", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21367" }, { "name": "CVE-2022-21342", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21342" }, { "name": "CVE-2022-21362", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21362" }, { "name": "CVE-2022-21303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21303" }, { "name": "CVE-2022-21256", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21256" }, { "name": "CVE-2022-21358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21358" }, { "name": "CVE-2022-21374", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21374" }, { "name": "CVE-2022-3602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602" }, { "name": "CVE-2022-2309", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2309" }, { "name": "CVE-2022-29824", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824" }, { "name": "CVE-2022-35737", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35737" }, { "name": "CVE-2022-40303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303" }, { "name": "CVE-2022-40304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304" }, { "name": "CVE-2020-8203", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203" }, { "name": "CVE-2022-3786", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786" }, { "name": "CVE-2022-2795", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2795" }, { "name": "CVE-2022-34903", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34903" }, { "name": "CVE-2022-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515" }, { "name": "CVE-2022-3996", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996" }, { "name": "CVE-2022-22942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942" }, { "name": "CVE-2021-4193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4193" }, { "name": "CVE-2020-15366", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366" }, { "name": "CVE-2022-22965", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22965" }, { "name": "CVE-2022-0213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0213" }, { "name": "CVE-2022-21418", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21418" }, { "name": "CVE-2022-21412", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21412" }, { "name": "CVE-2022-21437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21437" }, { "name": "CVE-2022-21478", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21478" }, { "name": "CVE-2022-21479", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21479" }, { "name": "CVE-2022-21438", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21438" }, { "name": "CVE-2022-21440", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21440" }, { "name": "CVE-2022-21451", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21451" }, { "name": "CVE-2022-21427", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21427" }, { "name": "CVE-2022-21415", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21415" }, { "name": "CVE-2022-21459", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21459" }, { "name": "CVE-2022-21460", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21460" }, { "name": "CVE-2022-21414", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21414" }, { "name": "CVE-2022-21413", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21413" }, { "name": "CVE-2022-21436", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21436" }, { "name": "CVE-2022-21435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21435" }, { "name": "CVE-2022-21462", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21462" }, { "name": "CVE-2022-21444", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21444" }, { "name": "CVE-2022-21417", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21417" }, { "name": "CVE-2022-21457", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21457" }, { "name": "CVE-2022-21425", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21425" }, { "name": "CVE-2022-21452", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21452" }, { "name": "CVE-2021-20266", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20266" }, { "name": "CVE-2022-1292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292" }, { "name": "CVE-2022-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473" }, { "name": "CVE-2021-3521", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3521" }, { "name": "CVE-2021-4122", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4122" }, { "name": "CVE-2022-2068", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068" }, { "name": "CVE-2017-7500", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500" }, { "name": "CVE-2021-33574", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33574" }, { "name": "CVE-2017-11164", "url": "https://www.cve.org/CVERecord?id=CVE-2017-11164" }, { "name": "CVE-2022-21525", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21525" }, { "name": "CVE-2022-21537", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21537" }, { "name": "CVE-2022-21455", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21455" }, { "name": "CVE-2022-21534", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21534" }, { "name": "CVE-2022-21528", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21528" }, { "name": "CVE-2022-21529", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21529" }, { "name": "CVE-2022-21531", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21531" }, { "name": "CVE-2022-21515", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21515" }, { "name": "CVE-2022-21538", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21538" }, { "name": "CVE-2022-21527", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21527" }, { "name": "CVE-2022-21517", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21517" }, { "name": "CVE-2022-21539", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21539" }, { "name": "CVE-2022-21556", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21556" }, { "name": "CVE-2022-21509", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21509" }, { "name": "CVE-2022-21553", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21553" }, { "name": "CVE-2022-21530", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21530" }, { "name": "CVE-2022-21522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21522" }, { "name": "CVE-2022-21547", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21547" }, { "name": "CVE-2022-21569", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21569" }, { "name": "CVE-2022-21526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21526" }, { "name": "CVE-2021-3999", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3999" }, { "name": "CVE-2022-23218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218" }, { "name": "CVE-2022-23219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219" }, { "name": "CVE-2022-27782", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782" }, { "name": "CVE-2021-25220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220" }, { "name": "CVE-2022-0396", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0396" }, { "name": "CVE-2022-3358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358" }, { "name": "CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "name": "CVE-2012-5783", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5783" }, { "name": "CVE-2022-21592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21592" }, { "name": "CVE-2022-21617", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21617" }, { "name": "CVE-2022-21595", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21595" }, { "name": "CVE-2022-21608", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21608" }, { "name": "CVE-2022-21589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21589" }, { "name": "CVE-2023-21863", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21863" }, { "name": "CVE-2023-21873", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21873" }, { "name": "CVE-2023-21879", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21879" }, { "name": "CVE-2023-21880", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21880" }, { "name": "CVE-2023-21869", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21869" }, { "name": "CVE-2023-21872", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21872" }, { "name": "CVE-2023-21877", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21877" }, { "name": "CVE-2023-21870", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21870" }, { "name": "CVE-2023-21887", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21887" }, { "name": "CVE-2023-21836", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21836" }, { "name": "CVE-2023-21881", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21881" }, { "name": "CVE-2023-21876", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21876" }, { "name": "CVE-2023-21840", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840" }, { "name": "CVE-2023-21878", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21878" }, { "name": "CVE-2023-21866", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21866" }, { "name": "CVE-2023-21875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21875" }, { "name": "CVE-2023-21865", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21865" }, { "name": "CVE-2023-21883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21883" }, { "name": "CVE-2023-21867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21867" }, { "name": "CVE-2023-21874", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21874" }, { "name": "CVE-2023-21871", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21871" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2023-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217" }, { "name": "CVE-2023-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2022-4415", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4415" }, { "name": "CVE-2023-24329", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2023-21963", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963" }, { "name": "CVE-2023-21977", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21977" }, { "name": "CVE-2023-21912", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912" }, { "name": "CVE-2023-29469", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469" }, { "name": "CVE-2023-28484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484" }, { "name": "CVE-2023-20873", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20873" }, { "name": "CVE-2023-20883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20883" }, { "name": "CVE-2023-27535", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535" }, { "name": "CVE-2023-27538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538" }, { "name": "CVE-2023-27536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536" }, { "name": "CVE-2023-27537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537" }, { "name": "CVE-2020-1752", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1752" }, { "name": "CVE-2021-35942", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35942" }, { "name": "CVE-2021-38604", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38604" }, { "name": "CVE-2020-29562", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29562" }, { "name": "CVE-2021-27645", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27645" }, { "name": "CVE-2023-28322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322" }, { "name": "CVE-2022-46908", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46908" }, { "name": "CVE-2023-28320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320" }, { "name": "CVE-2023-28321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321" }, { "name": "CVE-2023-22053", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22053" }, { "name": "CVE-2023-22007", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22007" }, { "name": "CVE-2022-4899", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4899" }, { "name": "CVE-2022-25883", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883" }, { "name": "CVE-2023-40403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403" }, { "name": "CVE-2023-4911", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2016-1000027", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027" }, { "name": "CVE-2023-35116", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116" }, { "name": "CVE-2023-22097", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22097" }, { "name": "CVE-2023-22084", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22084" }, { "name": "CVE-2023-22026", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22026" }, { "name": "CVE-2023-22028", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22028" }, { "name": "CVE-2023-22015", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22015" }, { "name": "CVE-2023-22103", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22103" }, { "name": "CVE-2023-22068", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22068" }, { "name": "CVE-2023-22078", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22078" }, { "name": "CVE-2023-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546" }, { "name": "CVE-2023-22059", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22059" }, { "name": "CVE-2023-22066", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22066" }, { "name": "CVE-2023-22114", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22114" }, { "name": "CVE-2023-22070", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22070" }, { "name": "CVE-2023-22032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22032" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-45853", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2023-40217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217" }, { "name": "CVE-2023-45803", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803" }, { "name": "CVE-2021-22570", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22570" }, { "name": "CVE-2023-2603", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603" }, { "name": "CVE-2023-2602", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2602" }, { "name": "CVE-2023-4527", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527" }, { "name": "CVE-2023-4813", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813" }, { "name": "CVE-2023-4806", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806" }, { "name": "CVE-2022-48303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48303" }, { "name": "CVE-2023-34055", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34055" }, { "name": "CVE-2023-4039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039" }, { "name": "CVE-2022-3715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3715" }, { "name": "CVE-2023-0687", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0687" }, { "name": "CVE-2023-5156", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156" }, { "name": "CVE-2022-48522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48522" }, { "name": "CVE-2023-39615", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615" }, { "name": "CVE-2021-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848" }, { "name": "CVE-2021-33294", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33294" }, { "name": "CVE-2021-43618", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618" }, { "name": "CVE-2023-45322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45322" }, { "name": "CVE-2022-28321", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28321" }, { "name": "CVE-2023-4016", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016" }, { "name": "CVE-2013-4235", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4235" }, { "name": "CVE-2023-34969", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969" }, { "name": "CVE-2021-20193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20193" }, { "name": "CVE-2023-29383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383" }, { "name": "CVE-2023-5981", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5981" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2023-6237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237" }, { "name": "CVE-2023-31484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484" }, { "name": "CVE-2023-36054", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36054" }, { "name": "CVE-2023-7104", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2023-46218", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218" }, { "name": "CVE-2023-46219", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2023-47100", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47100" }, { "name": "CVE-2023-47038", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038" }, { "name": "CVE-2023-39325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325" }, { "name": "CVE-2022-27772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27772" }, { "name": "CVE-2023-27043", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043" }, { "name": "CVE-2023-6481", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6481" }, { "name": "CVE-2023-36632", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632" }, { "name": "CVE-2024-28085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085" }, { "name": "CVE-2024-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511" }, { "name": "CVE-2020-22916", "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916" }, { "name": "CVE-2016-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781" }, { "name": "CVE-2023-3978", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978" }, { "name": "CVE-2017-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501" }, { "name": "CVE-2021-35939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939" }, { "name": "CVE-2024-0553", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553" }, { "name": "CVE-2021-35938", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938" }, { "name": "CVE-2021-35937", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937" }, { "name": "CVE-2023-6597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597" }, { "name": "CVE-2024-26686", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686" }, { "name": "CVE-2023-52572", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572" }, { "name": "CVE-2007-4559", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4559" }, { "name": "CVE-2023-3138", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3138" }, { "name": "CVE-2024-28182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182" }, { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2023-6378", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378" }, { "name": "CVE-2023-31486", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31486" }, { "name": "CVE-2024-26739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739" }, { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" }, { "name": "CVE-2023-51074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074" }, { "name": "CVE-2023-52757", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757" }, { "name": "CVE-2024-35866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866" }, { "name": "CVE-2024-35867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867" }, { "name": "CVE-2024-35943", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943" }, { "name": "CVE-2024-28180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180" }, { "name": "CVE-2024-29857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857" }, { "name": "CVE-2024-30171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171" }, { "name": "CVE-2024-30172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2024-35790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2024-2004", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2004" }, { "name": "CVE-2024-2398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398" }, { "name": "CVE-2024-0397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397" }, { "name": "CVE-2024-4030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030" }, { "name": "CVE-2024-4032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032" }, { "name": "CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "name": "CVE-2024-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450" }, { "name": "CVE-2024-25062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062" }, { "name": "CVE-2024-26458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458" }, { "name": "CVE-2024-26461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461" }, { "name": "CVE-2024-28834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834" }, { "name": "CVE-2024-2961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961" }, { "name": "CVE-2024-33599", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599" }, { "name": "CVE-2024-33600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600" }, { "name": "CVE-2024-33601", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601" }, { "name": "CVE-2024-33602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2024-36945", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945" }, { "name": "CVE-2024-38540", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540" }, { "name": "CVE-2024-38541", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541" }, { "name": "CVE-2023-4641", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641" }, { "name": "CVE-2024-0567", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0567" }, { "name": "CVE-2024-22365", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365" }, { "name": "CVE-2024-21137", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21137" }, { "name": "CVE-2024-0760", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0760" }, { "name": "CVE-2024-1737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737" }, { "name": "CVE-2024-1975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975" }, { "name": "CVE-2024-28835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28835" }, { "name": "CVE-2024-6923", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923" }, { "name": "CVE-2024-3219", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219" }, { "name": "CVE-2024-36908", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908" }, { "name": "CVE-2024-27402", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402" }, { "name": "CVE-2024-37891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891" }, { "name": "CVE-2024-6345", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345" }, { "name": "CVE-2024-38808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38808" }, { "name": "CVE-2024-38809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809" }, { "name": "CVE-2024-42230", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230" }, { "name": "CVE-2024-38807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38807" }, { "name": "CVE-2024-6232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2024-38816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816" }, { "name": "CVE-2022-48893", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893" }, { "name": "CVE-2024-42322", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322" }, { "name": "CVE-2024-7264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264" }, { "name": "CVE-2023-5841", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5841" }, { "name": "CVE-2024-34459", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34459" }, { "name": "CVE-2024-8096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096" }, { "name": "CVE-2023-6246", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6246" }, { "name": "CVE-2024-46812", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812" }, { "name": "CVE-2024-46821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821" }, { "name": "CVE-2024-46751", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751" }, { "name": "CVE-2024-46753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753" }, { "name": "CVE-2024-46774", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774" }, { "name": "CVE-2024-46787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787" }, { "name": "CVE-2022-21454", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21454" }, { "name": "CVE-2024-21193", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21193" }, { "name": "CVE-2024-21194", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21194" }, { "name": "CVE-2024-21196", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21196" }, { "name": "CVE-2024-21197", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21197" }, { "name": "CVE-2024-21198", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21198" }, { "name": "CVE-2024-21199", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21199" }, { "name": "CVE-2024-21201", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21201" }, { "name": "CVE-2024-21207", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21207" }, { "name": "CVE-2024-21209", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21209" }, { "name": "CVE-2024-21212", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21212" }, { "name": "CVE-2024-21213", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21213" }, { "name": "CVE-2024-21219", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21219" }, { "name": "CVE-2024-21236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21236" }, { "name": "CVE-2024-21239", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21239" }, { "name": "CVE-2024-21241", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21241" }, { "name": "CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2024-38819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819" }, { "name": "CVE-2024-38820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820" }, { "name": "CVE-2024-10487", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10487" }, { "name": "CVE-2024-10458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10458" }, { "name": "CVE-2024-10459", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10459" }, { "name": "CVE-2024-10460", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10460" }, { "name": "CVE-2024-10461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10461" }, { "name": "CVE-2024-10462", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10462" }, { "name": "CVE-2024-10463", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10463" }, { "name": "CVE-2024-10464", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10464" }, { "name": "CVE-2024-10465", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10465" }, { "name": "CVE-2024-10466", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10466" }, { "name": "CVE-2024-10467", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10467" }, { "name": "CVE-2024-10468", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10468" }, { "name": "CVE-2024-34447", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447" }, { "name": "CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "name": "CVE-2024-7592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592" }, { "name": "CVE-2024-8088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088" }, { "name": "CVE-2024-9681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681" }, { "name": "CVE-2024-11168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168" }, { "name": "CVE-2024-38828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828" }, { "name": "CVE-2024-46816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816" }, { "name": "CVE-2024-11395", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11395" }, { "name": "CVE-2024-49960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960" }, { "name": "CVE-2024-50047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047" }, { "name": "CVE-2024-50073", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073" }, { "name": "CVE-2024-11691", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11691" }, { "name": "CVE-2024-11692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11692" }, { "name": "CVE-2024-11693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11693" }, { "name": "CVE-2024-11694", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11694" }, { "name": "CVE-2024-11695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11695" }, { "name": "CVE-2024-11696", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11696" }, { "name": "CVE-2024-11697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11697" }, { "name": "CVE-2024-11698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11698" }, { "name": "CVE-2024-11699", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11699" }, { "name": "CVE-2024-11700", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11700" }, { "name": "CVE-2024-11701", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11701" }, { "name": "CVE-2024-11702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11702" }, { "name": "CVE-2024-11703", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11703" }, { "name": "CVE-2024-11704", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11704" }, { "name": "CVE-2024-11705", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11705" }, { "name": "CVE-2024-11706", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11706" }, { "name": "CVE-2024-11708", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11708" }, { "name": "CVE-2024-50272", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272" }, { "name": "CVE-2024-50280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280" }, { "name": "CVE-2024-11053", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053" }, { "name": "CVE-2024-10041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041" }, { "name": "CVE-2024-10963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963" }, { "name": "CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "name": "CVE-2024-49989", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989" }, { "name": "CVE-2024-50125", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125" }, { "name": "CVE-2024-53051", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051" }, { "name": "CVE-2024-53144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144" }, { "name": "CVE-2024-8805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805" }, { "name": "CVE-2025-0237", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0237" }, { "name": "CVE-2025-0238", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0238" }, { "name": "CVE-2025-0239", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0239" }, { "name": "CVE-2025-0240", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0240" }, { "name": "CVE-2025-0241", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0241" }, { "name": "CVE-2025-0242", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0242" }, { "name": "CVE-2025-0243", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0243" }, { "name": "CVE-2025-0245", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0245" }, { "name": "CVE-2025-0247", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0247" }, { "name": "CVE-2025-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0434" }, { "name": "CVE-2025-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0435" }, { "name": "CVE-2025-0436", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0436" }, { "name": "CVE-2025-0437", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0437" }, { "name": "CVE-2025-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0438" }, { "name": "CVE-2025-0439", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0439" }, { "name": "CVE-2025-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0440" }, { "name": "CVE-2025-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0441" }, { "name": "CVE-2025-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0442" }, { "name": "CVE-2025-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0443" }, { "name": "CVE-2025-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0446" }, { "name": "CVE-2025-0447", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0447" }, { "name": "CVE-2025-0448", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0448" }, { "name": "CVE-2025-21523", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523" }, { "name": "CVE-2025-0612", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0612" }, { "name": "CVE-2025-23083", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083" }, { "name": "CVE-2025-23084", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084" }, { "name": "CVE-2025-23085", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085" }, { "name": "CVE-2025-0938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938" }, { "name": "CVE-2025-0444", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0444" }, { "name": "CVE-2025-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0445" }, { "name": "CVE-2025-0451", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0451" }, { "name": "CVE-2025-0762", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0762" }, { "name": "CVE-2025-1009", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1009" }, { "name": "CVE-2025-1010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1010" }, { "name": "CVE-2025-1011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1011" }, { "name": "CVE-2025-1012", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1012" }, { "name": "CVE-2025-1013", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1013" }, { "name": "CVE-2025-1014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1014" }, { "name": "CVE-2024-56664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664" }, { "name": "CVE-2025-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1016" }, { "name": "CVE-2025-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1017" }, { "name": "CVE-2025-1018", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1018" }, { "name": "CVE-2025-1019", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1019" }, { "name": "CVE-2025-1020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1020" }, { "name": "CVE-2025-0167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167" }, { "name": "CVE-2025-0725", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725" }, { "name": "CVE-2024-47535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47535" }, { "name": "CVE-2024-50258", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258" }, { "name": "CVE-2024-53203", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203" }, { "name": "CVE-2024-53128", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128" }, { "name": "CVE-2025-0995", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0995" }, { "name": "CVE-2025-0996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0996" }, { "name": "CVE-2025-0997", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0997" }, { "name": "CVE-2025-0998", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0998" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2025-1414", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1414" }, { "name": "CVE-2025-0999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0999" }, { "name": "CVE-2025-1006", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1006" }, { "name": "CVE-2025-1426", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1426" }, { "name": "CVE-2024-56751", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751" }, { "name": "CVE-2023-39017", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39017" }, { "name": "CVE-2025-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795" }, { "name": "CVE-2025-1914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1914" }, { "name": "CVE-2025-1915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1915" }, { "name": "CVE-2025-1916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1916" }, { "name": "CVE-2025-1917", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1917" }, { "name": "CVE-2025-1918", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1918" }, { "name": "CVE-2025-1919", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1919" }, { "name": "CVE-2025-1921", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1921" }, { "name": "CVE-2025-1922", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1922" }, { "name": "CVE-2025-1923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1923" }, { "name": "CVE-2025-1930", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1930" }, { "name": "CVE-2025-1931", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1931" }, { "name": "CVE-2025-1932", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1932" }, { "name": "CVE-2025-1933", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1933" }, { "name": "CVE-2025-1934", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1934" }, { "name": "CVE-2025-1935", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1935" }, { "name": "CVE-2025-1936", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1936" }, { "name": "CVE-2025-1937", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1937" }, { "name": "CVE-2025-1938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1938" }, { "name": "CVE-2025-1939", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1939" }, { "name": "CVE-2025-1940", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1940" }, { "name": "CVE-2025-1941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1941" }, { "name": "CVE-2025-1942", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1942" }, { "name": "CVE-2025-1943", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1943" }, { "name": "CVE-2025-1920", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1920" }, { "name": "CVE-2025-2135", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2135" }, { "name": "CVE-2025-2136", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2136" }, { "name": "CVE-2025-2137", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2137" }, { "name": "CVE-2025-24813", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813" }, { "name": "CVE-2024-6763", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763" }, { "name": "CVE-2022-49043", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043" }, { "name": "CVE-2024-45338", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338" }, { "name": "CVE-2024-51744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744" }, { "name": "CVE-2025-24970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970" }, { "name": "CVE-2025-25193", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25193" }, { "name": "CVE-2024-45772", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45772" }, { "name": "CVE-2025-2476", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2476" }, { "name": "CVE-2025-2857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2857" }, { "name": "CVE-2024-45337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2025-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2783" }, { "name": "CVE-2022-49063", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063" }, { "name": "CVE-2022-49535", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535" }, { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2025-27113", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113" }, { "name": "CVE-2025-3066", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3066" }, { "name": "CVE-2025-3067", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3067" }, { "name": "CVE-2025-3068", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3068" }, { "name": "CVE-2025-3071", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3071" }, { "name": "CVE-2025-3072", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3072" }, { "name": "CVE-2025-3073", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3073" }, { "name": "CVE-2025-3074", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3074" }, { "name": "CVE-2025-3028", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3028" }, { "name": "CVE-2025-3029", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3029" }, { "name": "CVE-2025-3030", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3030" }, { "name": "CVE-2025-3031", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3031" }, { "name": "CVE-2025-3032", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3032" }, { "name": "CVE-2025-3033", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3033" }, { "name": "CVE-2025-3034", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3034" }, { "name": "CVE-2025-3035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3035" }, { "name": "CVE-2024-54458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458" }, { "name": "CVE-2025-3608", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3608" }, { "name": "CVE-2025-21574", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21574" }, { "name": "CVE-2025-21575", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21575" }, { "name": "CVE-2025-21577", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21577" }, { "name": "CVE-2025-21579", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21579" }, { "name": "CVE-2025-21580", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21580" }, { "name": "CVE-2025-21581", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21581" }, { "name": "CVE-2025-21584", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21584" }, { "name": "CVE-2025-21585", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21585" }, { "name": "CVE-2025-21588", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21588" }, { "name": "CVE-2025-30681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30681" }, { "name": "CVE-2025-30682", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30682" }, { "name": "CVE-2025-30683", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30683" }, { "name": "CVE-2025-30684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30684" }, { "name": "CVE-2025-30685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30685" }, { "name": "CVE-2025-30687", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30687" }, { "name": "CVE-2025-30688", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30688" }, { "name": "CVE-2025-30689", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30689" }, { "name": "CVE-2025-30693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30693" }, { "name": "CVE-2025-30695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30695" }, { "name": "CVE-2025-30696", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30696" }, { "name": "CVE-2025-30699", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30699" }, { "name": "CVE-2025-30703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30703" }, { "name": "CVE-2025-30704", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30704" }, { "name": "CVE-2025-30705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30705" }, { "name": "CVE-2025-30715", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30715" }, { "name": "CVE-2025-30721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30721" }, { "name": "CVE-2025-21839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839" }, { "name": "CVE-2025-3619", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3619" }, { "name": "CVE-2025-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3620" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "name": "CVE-2025-21941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941" }, { "name": "CVE-2025-21956", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956" }, { "name": "CVE-2025-21957", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957" }, { "name": "CVE-2025-21959", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959" }, { "name": "CVE-2025-21962", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962" }, { "name": "CVE-2025-21963", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963" }, { "name": "CVE-2025-21964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964" }, { "name": "CVE-2025-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968" }, { "name": "CVE-2025-21970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970" }, { "name": "CVE-2025-21975", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975" }, { "name": "CVE-2025-21981", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981" }, { "name": "CVE-2025-21991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991" }, { "name": "CVE-2025-21992", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992" }, { "name": "CVE-2025-21994", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994" }, { "name": "CVE-2025-21996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996" }, { "name": "CVE-2025-21999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999" }, { "name": "CVE-2025-22004", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004" }, { "name": "CVE-2025-22005", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005" }, { "name": "CVE-2025-22007", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007" }, { "name": "CVE-2025-22008", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008" }, { "name": "CVE-2025-22010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010" }, { "name": "CVE-2025-22014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014" }, { "name": "CVE-2024-12798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798" }, { "name": "CVE-2024-12801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12801" }, { "name": "CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-2312", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2025-4050", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4050" }, { "name": "CVE-2025-4051", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4051" }, { "name": "CVE-2025-4052", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4052" }, { "name": "CVE-2025-4096", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4096" }, { "name": "CVE-2025-2817", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2817" }, { "name": "CVE-2025-4082", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4082" }, { "name": "CVE-2025-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4083" }, { "name": "CVE-2025-4085", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4085" }, { "name": "CVE-2025-4087", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4087" }, { "name": "CVE-2025-4088", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4088" }, { "name": "CVE-2025-4089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4089" }, { "name": "CVE-2025-4090", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4090" }, { "name": "CVE-2025-4091", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4091" }, { "name": "CVE-2025-4092", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4092" }, { "name": "CVE-2023-53034", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034" }, { "name": "CVE-2024-46742", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742" }, { "name": "CVE-2025-21853", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853" }, { "name": "CVE-2025-22025", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025" }, { "name": "CVE-2025-22027", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027" }, { "name": "CVE-2025-22035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035" }, { "name": "CVE-2025-22044", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044" }, { "name": "CVE-2025-22045", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045" }, { "name": "CVE-2025-22050", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050" }, { "name": "CVE-2025-22054", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054" }, { "name": "CVE-2025-22055", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055" }, { "name": "CVE-2025-22056", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056" }, { "name": "CVE-2025-22060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060" }, { "name": "CVE-2025-22063", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063" }, { "name": "CVE-2025-22066", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066" }, { "name": "CVE-2025-22071", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071" }, { "name": "CVE-2025-22073", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073" }, { "name": "CVE-2025-22075", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075" }, { "name": "CVE-2025-22079", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079" }, { "name": "CVE-2025-22081", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081" }, { "name": "CVE-2025-22086", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086" }, { "name": "CVE-2025-22089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089" }, { "name": "CVE-2025-22097", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097" }, { "name": "CVE-2025-23136", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136" }, { "name": "CVE-2025-23138", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138" }, { "name": "CVE-2025-37785", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785" }, { "name": "CVE-2025-37838", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838" }, { "name": "CVE-2025-38152", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152" }, { "name": "CVE-2025-38575", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575" }, { "name": "CVE-2025-38637", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637" }, { "name": "CVE-2025-39728", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728" }, { "name": "CVE-2025-39735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735" }, { "name": "CVE-2025-27516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27516" }, { "name": "CVE-2025-29087", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29087" }, { "name": "CVE-2025-3277", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3277" }, { "name": "CVE-2025-4609", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4609" }, { "name": "CVE-2025-4664", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4664" }, { "name": "CVE-2025-4372", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4372" }, { "name": "CVE-2025-4516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2024-55549", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549" }, { "name": "CVE-2024-9287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287" }, { "name": "CVE-2025-24855", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855" }, { "name": "CVE-2025-4918", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4918" }, { "name": "CVE-2025-4919", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4919" }, { "name": "CVE-2025-41232", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41232" }, { "name": "CVE-2025-23165", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23165" }, { "name": "CVE-2025-23166", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23166" }, { "name": "CVE-2025-5063", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5063" }, { "name": "CVE-2025-5064", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5064" }, { "name": "CVE-2025-5065", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5065" }, { "name": "CVE-2025-5066", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5066" }, { "name": "CVE-2025-5067", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5067" }, { "name": "CVE-2025-32414", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414" }, { "name": "CVE-2025-32415", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415" }, { "name": "CVE-2022-49728", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728" }, { "name": "CVE-2024-58093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093" }, { "name": "CVE-2025-22018", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018" }, { "name": "CVE-2025-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020" }, { "name": "CVE-2025-22062", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062" }, { "name": "CVE-2025-23145", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145" }, { "name": "CVE-2025-37798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798" }, { "name": "CVE-2025-37749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-5263", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5263" }, { "name": "CVE-2025-5264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5264" }, { "name": "CVE-2025-5265", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5265" }, { "name": "CVE-2025-5266", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5266" }, { "name": "CVE-2025-5267", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5267" }, { "name": "CVE-2025-5268", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5268" }, { "name": "CVE-2025-5270", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5270" }, { "name": "CVE-2025-5271", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5271" }, { "name": "CVE-2025-5272", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5272" }, { "name": "CVE-2025-5281", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5281" }, { "name": "CVE-2025-5283", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5283" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2025-22021", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021" }, { "name": "CVE-2025-23140", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140" }, { "name": "CVE-2025-23142", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142" }, { "name": "CVE-2025-23144", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144" }, { "name": "CVE-2025-23146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146" }, { "name": "CVE-2025-23147", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147" }, { "name": "CVE-2025-23148", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148" }, { "name": "CVE-2025-23150", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150" }, { "name": "CVE-2025-23151", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151" }, { "name": "CVE-2025-23156", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156" }, { "name": "CVE-2025-23157", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157" }, { "name": "CVE-2025-23158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158" }, { "name": "CVE-2025-23159", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159" }, { "name": "CVE-2025-23161", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161" }, { "name": "CVE-2025-23163", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163" }, { "name": "CVE-2025-37738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738" }, { "name": "CVE-2025-37739", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739" }, { "name": "CVE-2025-37740", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740" }, { "name": "CVE-2025-37741", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741" }, { "name": "CVE-2025-37742", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742" }, { "name": "CVE-2025-37756", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756" }, { "name": "CVE-2025-37757", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757" }, { "name": "CVE-2025-37758", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758" }, { "name": "CVE-2025-37765", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765" }, { "name": "CVE-2025-37766", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766" }, { "name": "CVE-2025-37767", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767" }, { "name": "CVE-2025-37768", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768" }, { "name": "CVE-2025-37770", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770" }, { "name": "CVE-2025-37771", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771" }, { "name": "CVE-2025-37773", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773" }, { "name": "CVE-2025-37780", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780" }, { "name": "CVE-2025-37781", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781" }, { "name": "CVE-2025-37787", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787" }, { "name": "CVE-2025-37788", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788" }, { "name": "CVE-2025-37789", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789" }, { "name": "CVE-2025-37790", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790" }, { "name": "CVE-2025-37792", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792" }, { "name": "CVE-2025-37794", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794" }, { "name": "CVE-2025-37796", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796" }, { "name": "CVE-2025-37797", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797" }, { "name": "CVE-2025-37803", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803" }, { "name": "CVE-2025-37805", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805" }, { "name": "CVE-2025-37808", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808" }, { "name": "CVE-2025-37810", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810" }, { "name": "CVE-2025-37811", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811" }, { "name": "CVE-2025-37812", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812" }, { "name": "CVE-2025-37817", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817" }, { "name": "CVE-2025-37823", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823" }, { "name": "CVE-2025-37824", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824" }, { "name": "CVE-2025-37829", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829" }, { "name": "CVE-2025-37830", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830" }, { "name": "CVE-2025-37836", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836" }, { "name": "CVE-2025-37839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839" }, { "name": "CVE-2025-37840", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840" }, { "name": "CVE-2025-37841", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841" }, { "name": "CVE-2025-37844", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844" }, { "name": "CVE-2025-37850", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850" }, { "name": "CVE-2025-37851", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851" }, { "name": "CVE-2025-37857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857" }, { "name": "CVE-2025-37858", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858" }, { "name": "CVE-2025-37859", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859" }, { "name": "CVE-2025-37862", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862" }, { "name": "CVE-2025-37867", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867" }, { "name": "CVE-2025-37871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871" }, { "name": "CVE-2025-37875", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875" }, { "name": "CVE-2025-37881", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881" }, { "name": "CVE-2025-37883", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883" }, { "name": "CVE-2025-37885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885" }, { "name": "CVE-2025-37889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889" }, { "name": "CVE-2025-37892", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892" }, { "name": "CVE-2025-37937", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937" }, { "name": "CVE-2025-37940", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940" }, { "name": "CVE-2025-37982", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982" }, { "name": "CVE-2025-37983", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983" }, { "name": "CVE-2025-37985", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985" }, { "name": "CVE-2025-37989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989" }, { "name": "CVE-2025-37819", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819" }, { "name": "CVE-2025-37890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890" }, { "name": "CVE-2025-37905", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905" }, { "name": "CVE-2025-37909", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909" }, { "name": "CVE-2025-37911", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911" }, { "name": "CVE-2025-37912", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912" }, { "name": "CVE-2025-37913", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913" }, { "name": "CVE-2025-37914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914" }, { "name": "CVE-2025-37915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915" }, { "name": "CVE-2025-37923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923" }, { "name": "CVE-2025-37927", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927" }, { "name": "CVE-2025-37930", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930" }, { "name": "CVE-2025-37932", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932" }, { "name": "CVE-2025-37949", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949" }, { "name": "CVE-2025-37964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964" }, { "name": "CVE-2025-37967", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967" }, { "name": "CVE-2025-37969", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969" }, { "name": "CVE-2025-37970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970" }, { "name": "CVE-2025-37990", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990" }, { "name": "CVE-2025-37991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991" }, { "name": "CVE-2025-5068", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5068" }, { "name": "CVE-2025-5419", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5419" }, { "name": "CVE-2025-27144", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144" }, { "name": "CVE-2025-49709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49709" }, { "name": "CVE-2025-49710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49710" }, { "name": "CVE-2023-6779", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6779" }, { "name": "CVE-2023-6780", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6780" }, { "name": "CVE-2024-12133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133" }, { "name": "CVE-2024-12243", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243" }, { "name": "CVE-2024-2236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236" }, { "name": "CVE-2024-56433", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56433" }, { "name": "CVE-2025-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395" }, { "name": "CVE-2025-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390" }, { "name": "CVE-2025-29088", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29088" }, { "name": "CVE-2025-31115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115" }, { "name": "CVE-2025-4598", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4598" }, { "name": "CVE-2025-5958", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5958" }, { "name": "CVE-2025-5959", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5959" }, { "name": "CVE-2025-41234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41234" }, { "name": "CVE-2025-49146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146" }, { "name": "CVE-2025-48988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988" }, { "name": "CVE-2025-49124", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49124" }, { "name": "CVE-2025-49125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125" }, { "name": "CVE-2025-6191", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6191" }, { "name": "CVE-2025-6192", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6192" }, { "name": "CVE-2024-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427" }, { "name": "CVE-2024-56406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-4802", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802" }, { "name": "CVE-2022-49168", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168" }, { "name": "CVE-2025-37998", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998" }, { "name": "CVE-2023-42366", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42366" }, { "name": "CVE-2025-6424", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6424" }, { "name": "CVE-2025-6425", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6425" }, { "name": "CVE-2025-6426", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6426" }, { "name": "CVE-2025-6427", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6427" }, { "name": "CVE-2025-6429", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6429" }, { "name": "CVE-2025-6430", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6430" }, { "name": "CVE-2025-6432", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6432" }, { "name": "CVE-2025-6433", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6433" }, { "name": "CVE-2025-6434", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6434" }, { "name": "CVE-2025-6020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020" }, { "name": "CVE-2025-6555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6555" }, { "name": "CVE-2025-6556", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6556" }, { "name": "CVE-2025-6557", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6557" }, { "name": "CVE-2025-6435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6435" }, { "name": "CVE-2025-6436", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6436" }, { "name": "CVE-2025-6554", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6554" }, { "name": "CVE-2025-6021", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021" }, { "name": "CVE-2022-49636", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636" }, { "name": "CVE-2025-37997", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997" }, { "name": "CVE-2025-38000", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000" }, { "name": "CVE-2025-38001", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001" }, { "name": "CVE-2025-32462", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462" }, { "name": "CVE-2025-52520", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52520" }, { "name": "CVE-2025-53506", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506" }, { "name": "CVE-2024-47081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081" }, { "name": "CVE-2025-3576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576" }, { "name": "CVE-2025-47268", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47268" }, { "name": "CVE-2025-37992", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992" }, { "name": "CVE-2025-37994", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994" }, { "name": "CVE-2025-37995", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995" }, { "name": "CVE-2025-38005", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005" }, { "name": "CVE-2025-38009", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009" }, { "name": "CVE-2025-38023", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023" }, { "name": "CVE-2025-38024", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024" }, { "name": "CVE-2025-38083", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083" }, { "name": "CVE-2025-22227", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22227" }, { "name": "CVE-2025-6558", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6558" }, { "name": "CVE-2025-7656", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7656" }, { "name": "CVE-2025-7657", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7657" }, { "name": "CVE-2025-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749" }, { "name": "CVE-2025-30754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754" }, { "name": "CVE-2025-50059", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059" }, { "name": "CVE-2025-50106", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106" }, { "name": "CVE-2025-50088", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50088" }, { "name": "CVE-2025-48734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734" }, { "name": "CVE-2022-21546", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546" }, { "name": "CVE-2020-16156", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16156" }, { "name": "CVE-2025-8010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8010" }, { "name": "CVE-2025-8011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8011" }, { "name": "CVE-2025-8027", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8027" }, { "name": "CVE-2025-8028", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8028" }, { "name": "CVE-2025-8029", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8029" }, { "name": "CVE-2025-8030", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8030" }, { "name": "CVE-2025-8031", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8031" }, { "name": "CVE-2025-8032", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8032" }, { "name": "CVE-2025-8033", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8033" }, { "name": "CVE-2025-8034", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8034" }, { "name": "CVE-2025-8035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8035" }, { "name": "CVE-2025-8036", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8036" }, { "name": "CVE-2025-8037", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8037" }, { "name": "CVE-2025-8038", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8038" }, { "name": "CVE-2025-8039", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8039" }, { "name": "CVE-2025-8040", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8040" }, { "name": "CVE-2025-8041", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8041" }, { "name": "CVE-2025-8043", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8043" }, { "name": "CVE-2025-8044", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8044" }, { "name": "CVE-2024-23337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337" }, { "name": "CVE-2024-45339", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339" }, { "name": "CVE-2024-47611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611" }, { "name": "CVE-2025-0913", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913" }, { "name": "CVE-2025-22874", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874" }, { "name": "CVE-2025-32988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988" }, { "name": "CVE-2025-32989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989" }, { "name": "CVE-2025-32990", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990" }, { "name": "CVE-2025-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177" }, { "name": "CVE-2025-4673", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673" }, { "name": "CVE-2025-48060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060" }, { "name": "CVE-2025-4877", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877" }, { "name": "CVE-2025-4878", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878" }, { "name": "CVE-2025-48924", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924" }, { "name": "CVE-2025-50181", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181" }, { "name": "CVE-2025-5318", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318" }, { "name": "CVE-2025-5372", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372" }, { "name": "CVE-2025-5914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914" }, { "name": "CVE-2025-5915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915" }, { "name": "CVE-2025-5916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916" }, { "name": "CVE-2025-5917", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917" }, { "name": "CVE-2025-6069", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069" }, { "name": "CVE-2025-6395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395" }, { "name": "CVE-2025-38094", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094" }, { "name": "CVE-2025-8194", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8194" }, { "name": "CVE-2025-8292", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8292" }, { "name": "CVE-2025-7424", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7424" }, { "name": "CVE-2025-7425", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425" }, { "name": "CVE-2025-50182", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50182" }, { "name": "CVE-2025-5889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5889" }, { "name": "CVE-2025-8576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8576" }, { "name": "CVE-2025-8577", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8577" }, { "name": "CVE-2025-8578", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8578" }, { "name": "CVE-2025-8579", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8579" }, { "name": "CVE-2025-8580", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8580" }, { "name": "CVE-2025-8581", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8581" }, { "name": "CVE-2025-8582", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8582" }, { "name": "CVE-2025-8583", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8583" }, { "name": "CVE-2025-27210", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27210" }, { "name": "CVE-2025-27817", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27817" }, { "name": "CVE-2025-27818", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27818" }, { "name": "CVE-2025-8879", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8879" }, { "name": "CVE-2025-8880", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8880" }, { "name": "CVE-2025-8881", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8881" }, { "name": "CVE-2025-8882", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8882" }, { "name": "CVE-2025-8901", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8901" }, { "name": "CVE-2025-48989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48989" }, { "name": "CVE-2025-7339", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7339" }, { "name": "CVE-2025-7783", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7783" }, { "name": "CVE-2021-32256", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32256" }, { "name": "CVE-2024-25260", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25260" }, { "name": "CVE-2025-1371", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1371" }, { "name": "CVE-2025-1376", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1376" }, { "name": "CVE-2025-1377", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1377" }, { "name": "CVE-2025-47273", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273" }, { "name": "CVE-2025-48964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48964" }, { "name": "CVE-2025-49794", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794" }, { "name": "CVE-2025-49796", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796" }, { "name": "CVE-2025-41242", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41242" }, { "name": "CVE-2025-9132", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9132" }, { "name": "CVE-2025-54988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988" }, { "name": "CVE-2025-6965", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965" }, { "name": "CVE-2024-13009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13009" }, { "name": "CVE-2025-55668", "url": "https://www.cve.org/CVERecord?id=CVE-2025-55668" }, { "name": "CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "name": "CVE-2025-47907", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47907" }, { "name": "CVE-2025-52999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999" }, { "name": "CVE-2025-55163", "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163" }, { "name": "CVE-2025-8941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941" }, { "name": "CVE-2025-9288", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288" }, { "name": "CVE-2005-2541", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2541" }, { "name": "CVE-2008-5727", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5727" }, { "name": "CVE-2008-5728", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5728" }, { "name": "CVE-2008-5729", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5729" }, { "name": "CVE-2008-5730", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5730" }, { "name": "CVE-2008-5742", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5742" }, { "name": "CVE-2011-3374", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3374" }, { "name": "CVE-2014-4715", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4715" }, { "name": "CVE-2015-2214", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2214" }, { "name": "CVE-2016-0682", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0682" }, { "name": "CVE-2016-0689", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0689" }, { "name": "CVE-2016-0692", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0692" }, { "name": "CVE-2016-0694", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0694" }, { "name": "CVE-2016-2149", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2149" }, { "name": "CVE-2016-2160", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2160" }, { "name": "CVE-2016-3418", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3418" }, { "name": "CVE-2017-10140", "url": "https://www.cve.org/CVERecord?id=CVE-2017-10140" }, { "name": "CVE-2017-12195", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12195" }, { "name": "CVE-2017-12629", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12629" }, { "name": "CVE-2017-3604", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3604" }, { "name": "CVE-2017-3605", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3605" }, { "name": "CVE-2017-3606", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3606" }, { "name": "CVE-2017-3607", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3607" }, { "name": "CVE-2017-3608", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3608" }, { "name": "CVE-2017-3609", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3609" }, { "name": "CVE-2017-3610", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3610" }, { "name": "CVE-2017-3611", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3611" }, { "name": "CVE-2017-3612", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3612" }, { "name": "CVE-2017-3613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3613" }, { "name": "CVE-2017-3614", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3614" }, { "name": "CVE-2017-3615", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3615" }, { "name": "CVE-2017-3616", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3616" }, { "name": "CVE-2017-3617", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3617" }, { "name": "CVE-2018-1000169", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169" }, { "name": "CVE-2018-1196", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1196" }, { "name": "CVE-2018-1273", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1273" }, { "name": "CVE-2019-10782", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10782" }, { "name": "CVE-2019-9658", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9658" }, { "name": "CVE-2020-2981", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2981" }, { "name": "CVE-2021-20298", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20298" }, { "name": "CVE-2021-20304", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20304" }, { "name": "CVE-2021-22055", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22055" }, { "name": "CVE-2021-23169", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23169" }, { "name": "CVE-2021-3236", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3236" }, { "name": "CVE-2022-0635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0635" }, { "name": "CVE-2022-0667", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0667" }, { "name": "CVE-2022-3219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3219" }, { "name": "CVE-2022-39046", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39046" }, { "name": "CVE-2022-42010", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42010" }, { "name": "CVE-2022-42011", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42011" }, { "name": "CVE-2022-42012", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42012" }, { "name": "CVE-2022-44638", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44638" }, { "name": "CVE-2023-31437", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31437" }, { "name": "CVE-2023-31438", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31438" }, { "name": "CVE-2023-31439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31439" }, { "name": "CVE-2023-37769", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37769" }, { "name": "CVE-2023-39810", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39810" }, { "name": "CVE-2023-4156", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4156" }, { "name": "CVE-2023-4320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4320" }, { "name": "CVE-2023-43785", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43785" }, { "name": "CVE-2023-43786", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43786" }, { "name": "CVE-2023-43787", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43787" }, { "name": "CVE-2023-46129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46129" }, { "name": "CVE-2023-47039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47039" }, { "name": "CVE-2023-5189", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5189" }, { "name": "CVE-2024-11584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11584" }, { "name": "CVE-2024-21742", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21742" }, { "name": "CVE-2024-22047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22047" }, { "name": "CVE-2024-2397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2397" }, { "name": "CVE-2024-26462", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26462" }, { "name": "CVE-2024-31047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31047" }, { "name": "CVE-2024-3220", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3220" }, { "name": "CVE-2024-58251", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58251" }, { "name": "CVE-2024-6174", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6174" }, { "name": "CVE-2024-7012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7012" }, { "name": "CVE-2025-1352", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1352" }, { "name": "CVE-2025-1365", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1365" }, { "name": "CVE-2025-1372", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1372" }, { "name": "CVE-2025-24294", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24294" }, { "name": "CVE-2025-26519", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26519" }, { "name": "CVE-2025-27587", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27587" }, { "name": "CVE-2025-30258", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30258" }, { "name": "CVE-2025-31672", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31672" }, { "name": "CVE-2025-40909", "url": "https://www.cve.org/CVERecord?id=CVE-2025-40909" }, { "name": "CVE-2025-43857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-43857" }, { "name": "CVE-2025-45582", "url": "https://www.cve.org/CVERecord?id=CVE-2025-45582" }, { "name": "CVE-2025-45768", "url": "https://www.cve.org/CVERecord?id=CVE-2025-45768" }, { "name": "CVE-2025-46392", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46392" }, { "name": "CVE-2025-46394", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46394" }, { "name": "CVE-2025-49795", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795" }, { "name": "CVE-2025-5115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5115" }, { "name": "CVE-2025-5222", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222" }, { "name": "CVE-2025-5278", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5278" }, { "name": "CVE-2025-53864", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53864" }, { "name": "CVE-2025-6170", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6170" }, { "name": "CVE-2025-6297", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6297" }, { "name": "CVE-2025-7962", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7962" }, { "name": "CVE-2025-8058", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8058" }, { "name": "CVE-2025-8262", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8262" }, { "name": "CVE-2025-8732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8732" }, { "name": "CVE-2025-8885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8885" }, { "name": "CVE-2025-8916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8916" }, { "name": "CVE-2025-9179", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9179" }, { "name": "CVE-2025-9180", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9180" }, { "name": "CVE-2025-9181", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9181" }, { "name": "CVE-2025-9182", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9182" }, { "name": "CVE-2025-9183", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9183" }, { "name": "CVE-2025-9184", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9184" }, { "name": "CVE-2025-9185", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9185" }, { "name": "CVE-2025-9187", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9187" }, { "name": "CVE-2025-9308", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9308" } ], "initial_release_date": "2025-09-05T00:00:00", "last_revision_date": "2025-09-05T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0756", "revisions": [ { "description": "Version initiale", "revision_date": "2025-09-05T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware", "vendor_advisories": [ { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36093", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36102", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36101", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36100", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36105", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36091", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36078", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36107", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36094", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36097", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36108", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36095", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36096", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36106", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36109", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36098", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36103", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36099", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36092", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36110", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110" } ] }
rhsa-2025:7500
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for perl is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Perl is a high-level programming language that is commonly used for system administration utilities and web programming.\n\nSecurity Fix(es):\n\n* perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes (CVE-2024-56406)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:7500", "url": "https://access.redhat.com/errata/RHSA-2025:7500" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2359290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359290" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_7500.json" } ], "title": "Red Hat Security Advisory: perl security update", "tracking": { "current_release_date": "2025-10-16T15:04:06+00:00", "generator": { "date": "2025-10-16T15:04:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:7500", "initial_release_date": "2025-05-13T16:01:58+00:00", "revision_history": [ { "date": "2025-05-13T16:01:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-13T16:01:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-16T15:04:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perl-4:5.40.2-512.1.el10_0.src", "product": { "name": "perl-4:5.40.2-512.1.el10_0.src", "product_id": "perl-4:5.40.2-512.1.el10_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl@5.40.2-512.1.el10_0?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "perl-4:5.40.2-512.1.el10_0.aarch64", "product": { "name": "perl-4:5.40.2-512.1.el10_0.aarch64", "product_id": "perl-4:5.40.2-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl@5.40.2-512.1.el10_0?arch=aarch64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-B-0:1.89-512.1.el10_0.aarch64", "product": { "name": "perl-B-0:1.89-512.1.el10_0.aarch64", "product_id": "perl-B-0:1.89-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-B@1.89-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.aarch64", "product": { "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.aarch64", "product_id": "perl-Devel-Peek-0:1.34-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Devel-Peek@1.34-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-DynaLoader-0:1.56-512.1.el10_0.aarch64", "product": { "name": "perl-DynaLoader-0:1.56-512.1.el10_0.aarch64", "product_id": "perl-DynaLoader-0:1.56-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DynaLoader@1.56-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Errno-0:1.38-512.1.el10_0.aarch64", "product": { "name": "perl-Errno-0:1.38-512.1.el10_0.aarch64", "product_id": "perl-Errno-0:1.38-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Errno@1.38-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Fcntl-0:1.18-512.1.el10_0.aarch64", "product": { "name": "perl-Fcntl-0:1.18-512.1.el10_0.aarch64", "product_id": "perl-Fcntl-0:1.18-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Fcntl@1.18-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.aarch64", "product": { "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.aarch64", "product_id": "perl-File-DosGlob-0:1.12-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-GDBM_File-1:1.24-512.1.el10_0.aarch64", "product": { "name": "perl-GDBM_File-1:1.24-512.1.el10_0.aarch64", "product_id": "perl-GDBM_File-1:1.24-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-GDBM_File@1.24-512.1.el10_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-Hash-Util-0:0.32-512.1.el10_0.aarch64", "product": { "name": "perl-Hash-Util-0:0.32-512.1.el10_0.aarch64", "product_id": "perl-Hash-Util-0:0.32-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util@0.32-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.aarch64", "product": { "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.aarch64", "product_id": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.27-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.aarch64", "product": { "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.aarch64", "product_id": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.24-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-IO-0:1.55-512.1.el10_0.aarch64", "product": { "name": "perl-IO-0:1.55-512.1.el10_0.aarch64", "product_id": "perl-IO-0:1.55-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-IO@1.55-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-NDBM_File-0:1.17-512.1.el10_0.aarch64", "product": { "name": "perl-NDBM_File-0:1.17-512.1.el10_0.aarch64", "product_id": "perl-NDBM_File-0:1.17-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-NDBM_File@1.17-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-ODBM_File-0:1.18-512.1.el10_0.aarch64", "product": { "name": "perl-ODBM_File-0:1.18-512.1.el10_0.aarch64", "product_id": "perl-ODBM_File-0:1.18-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ODBM_File@1.18-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Opcode-0:1.65-512.1.el10_0.aarch64", "product": { "name": "perl-Opcode-0:1.65-512.1.el10_0.aarch64", "product_id": "perl-Opcode-0:1.65-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Opcode@1.65-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-POSIX-0:2.20-512.1.el10_0.aarch64", "product": { "name": "perl-POSIX-0:2.20-512.1.el10_0.aarch64", "product_id": "perl-POSIX-0:2.20-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-POSIX@2.20-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.aarch64", "product": { "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.aarch64", "product_id": "perl-Sys-Hostname-0:1.25-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.25-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.aarch64", "product": { "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.aarch64", "product_id": "perl-Time-Piece-0:1.3401-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-devel-4:5.40.2-512.1.el10_0.aarch64", "product": { "name": "perl-devel-4:5.40.2-512.1.el10_0.aarch64", "product_id": "perl-devel-4:5.40.2-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-devel@5.40.2-512.1.el10_0?arch=aarch64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-interpreter-4:5.40.2-512.1.el10_0.aarch64", "product": { "name": "perl-interpreter-4:5.40.2-512.1.el10_0.aarch64", "product_id": "perl-interpreter-4:5.40.2-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-interpreter@5.40.2-512.1.el10_0?arch=aarch64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-lib-0:0.65-512.1.el10_0.aarch64", "product": { "name": "perl-lib-0:0.65-512.1.el10_0.aarch64", "product_id": "perl-lib-0:0.65-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-lib@0.65-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-libs-4:5.40.2-512.1.el10_0.aarch64", "product": { "name": "perl-libs-4:5.40.2-512.1.el10_0.aarch64", "product_id": "perl-libs-4:5.40.2-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-libs@5.40.2-512.1.el10_0?arch=aarch64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-mro-0:1.29-512.1.el10_0.aarch64", "product": { "name": "perl-mro-0:1.29-512.1.el10_0.aarch64", "product_id": "perl-mro-0:1.29-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-mro@1.29-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-ph-0:5.40.2-512.1.el10_0.aarch64", "product": { "name": "perl-ph-0:5.40.2-512.1.el10_0.aarch64", "product_id": "perl-ph-0:5.40.2-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ph@5.40.2-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-debugsource-4:5.40.2-512.1.el10_0.aarch64", "product": { "name": "perl-debugsource-4:5.40.2-512.1.el10_0.aarch64", "product_id": "perl-debugsource-4:5.40.2-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-debugsource@5.40.2-512.1.el10_0?arch=aarch64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.aarch64", "product": { "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.aarch64", "product_id": "perl-B-debuginfo-0:1.89-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-B-debuginfo@1.89-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.aarch64", "product": { "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.aarch64", "product_id": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.34-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.aarch64", "product": { "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.aarch64", "product_id": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.18-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.aarch64", "product": { "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.aarch64", "product_id": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.aarch64", "product": { "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.aarch64", "product_id": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.24-512.1.el10_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.aarch64", "product": { "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.aarch64", "product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.27-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.aarch64", "product": { "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.aarch64", "product_id": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.32-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.aarch64", "product": { "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.aarch64", "product_id": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.24-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.aarch64", "product": { "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.aarch64", "product_id": "perl-IO-debuginfo-0:1.55-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.55-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.aarch64", "product": { "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.aarch64", "product_id": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.17-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.aarch64", "product": { "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.aarch64", "product_id": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.18-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.aarch64", "product": { "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.aarch64", "product_id": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.65-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.aarch64", "product": { "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.aarch64", "product_id": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@2.20-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.aarch64", "product": { "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.aarch64", "product_id": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.25-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.aarch64", "product": { "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.aarch64", "product_id": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-512.1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "product": { "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "product_id": "perl-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-debuginfo@5.40.2-512.1.el10_0?arch=aarch64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "product": { "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "product_id": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.40.2-512.1.el10_0?arch=aarch64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "product": { "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "product_id": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.40.2-512.1.el10_0?arch=aarch64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.aarch64", "product": { "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.aarch64", "product_id": "perl-mro-debuginfo-0:1.29-512.1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.29-512.1.el10_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "perl-4:5.40.2-512.1.el10_0.ppc64le", "product": { "name": "perl-4:5.40.2-512.1.el10_0.ppc64le", "product_id": "perl-4:5.40.2-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl@5.40.2-512.1.el10_0?arch=ppc64le\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-B-0:1.89-512.1.el10_0.ppc64le", "product": { "name": "perl-B-0:1.89-512.1.el10_0.ppc64le", "product_id": "perl-B-0:1.89-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-B@1.89-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.ppc64le", "product": { "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.ppc64le", "product_id": "perl-Devel-Peek-0:1.34-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Devel-Peek@1.34-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-DynaLoader-0:1.56-512.1.el10_0.ppc64le", "product": { "name": "perl-DynaLoader-0:1.56-512.1.el10_0.ppc64le", "product_id": "perl-DynaLoader-0:1.56-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DynaLoader@1.56-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Errno-0:1.38-512.1.el10_0.ppc64le", "product": { "name": "perl-Errno-0:1.38-512.1.el10_0.ppc64le", "product_id": "perl-Errno-0:1.38-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Errno@1.38-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Fcntl-0:1.18-512.1.el10_0.ppc64le", "product": { "name": "perl-Fcntl-0:1.18-512.1.el10_0.ppc64le", "product_id": "perl-Fcntl-0:1.18-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Fcntl@1.18-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.ppc64le", "product": { "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.ppc64le", "product_id": "perl-File-DosGlob-0:1.12-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-GDBM_File-1:1.24-512.1.el10_0.ppc64le", "product": { "name": "perl-GDBM_File-1:1.24-512.1.el10_0.ppc64le", "product_id": "perl-GDBM_File-1:1.24-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-GDBM_File@1.24-512.1.el10_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-Hash-Util-0:0.32-512.1.el10_0.ppc64le", "product": { "name": "perl-Hash-Util-0:0.32-512.1.el10_0.ppc64le", "product_id": "perl-Hash-Util-0:0.32-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util@0.32-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.ppc64le", "product": { "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.ppc64le", "product_id": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.27-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.ppc64le", "product": { "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.ppc64le", "product_id": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.24-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-IO-0:1.55-512.1.el10_0.ppc64le", "product": { "name": "perl-IO-0:1.55-512.1.el10_0.ppc64le", "product_id": "perl-IO-0:1.55-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-IO@1.55-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-NDBM_File-0:1.17-512.1.el10_0.ppc64le", "product": { "name": "perl-NDBM_File-0:1.17-512.1.el10_0.ppc64le", "product_id": "perl-NDBM_File-0:1.17-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-NDBM_File@1.17-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-ODBM_File-0:1.18-512.1.el10_0.ppc64le", "product": { "name": "perl-ODBM_File-0:1.18-512.1.el10_0.ppc64le", "product_id": "perl-ODBM_File-0:1.18-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ODBM_File@1.18-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Opcode-0:1.65-512.1.el10_0.ppc64le", "product": { "name": "perl-Opcode-0:1.65-512.1.el10_0.ppc64le", "product_id": "perl-Opcode-0:1.65-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Opcode@1.65-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-POSIX-0:2.20-512.1.el10_0.ppc64le", "product": { "name": "perl-POSIX-0:2.20-512.1.el10_0.ppc64le", "product_id": "perl-POSIX-0:2.20-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-POSIX@2.20-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.ppc64le", "product": { "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.ppc64le", "product_id": "perl-Sys-Hostname-0:1.25-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.25-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.ppc64le", "product": { "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.ppc64le", "product_id": "perl-Time-Piece-0:1.3401-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-devel-4:5.40.2-512.1.el10_0.ppc64le", "product": { "name": "perl-devel-4:5.40.2-512.1.el10_0.ppc64le", "product_id": "perl-devel-4:5.40.2-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-devel@5.40.2-512.1.el10_0?arch=ppc64le\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-interpreter-4:5.40.2-512.1.el10_0.ppc64le", "product": { "name": "perl-interpreter-4:5.40.2-512.1.el10_0.ppc64le", "product_id": "perl-interpreter-4:5.40.2-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-interpreter@5.40.2-512.1.el10_0?arch=ppc64le\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-lib-0:0.65-512.1.el10_0.ppc64le", "product": { "name": "perl-lib-0:0.65-512.1.el10_0.ppc64le", "product_id": "perl-lib-0:0.65-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-lib@0.65-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-libs-4:5.40.2-512.1.el10_0.ppc64le", "product": { "name": "perl-libs-4:5.40.2-512.1.el10_0.ppc64le", "product_id": "perl-libs-4:5.40.2-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-libs@5.40.2-512.1.el10_0?arch=ppc64le\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-mro-0:1.29-512.1.el10_0.ppc64le", "product": { "name": "perl-mro-0:1.29-512.1.el10_0.ppc64le", "product_id": "perl-mro-0:1.29-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-mro@1.29-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-ph-0:5.40.2-512.1.el10_0.ppc64le", "product": { "name": "perl-ph-0:5.40.2-512.1.el10_0.ppc64le", "product_id": "perl-ph-0:5.40.2-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ph@5.40.2-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-debugsource-4:5.40.2-512.1.el10_0.ppc64le", "product": { "name": "perl-debugsource-4:5.40.2-512.1.el10_0.ppc64le", "product_id": "perl-debugsource-4:5.40.2-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-debugsource@5.40.2-512.1.el10_0?arch=ppc64le\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.ppc64le", "product": { "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.ppc64le", "product_id": "perl-B-debuginfo-0:1.89-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-B-debuginfo@1.89-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.ppc64le", "product": { "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.ppc64le", "product_id": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.34-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.ppc64le", "product": { "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.ppc64le", "product_id": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.18-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.ppc64le", "product": { "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.ppc64le", "product_id": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.ppc64le", "product": { "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.ppc64le", "product_id": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.24-512.1.el10_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.ppc64le", "product": { "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.ppc64le", "product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.27-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.ppc64le", "product": { "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.ppc64le", "product_id": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.32-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.ppc64le", "product": { "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.ppc64le", "product_id": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.24-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.ppc64le", "product": { "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.ppc64le", "product_id": "perl-IO-debuginfo-0:1.55-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.55-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.ppc64le", "product": { "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.ppc64le", "product_id": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.17-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.ppc64le", "product": { "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.ppc64le", "product_id": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.18-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.ppc64le", "product": { "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.ppc64le", "product_id": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.65-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.ppc64le", "product": { "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.ppc64le", "product_id": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@2.20-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.ppc64le", "product": { "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.ppc64le", "product_id": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.25-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.ppc64le", "product": { "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.ppc64le", "product_id": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-512.1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "product": { "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "product_id": "perl-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-debuginfo@5.40.2-512.1.el10_0?arch=ppc64le\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "product": { "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "product_id": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.40.2-512.1.el10_0?arch=ppc64le\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "product": { "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "product_id": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.40.2-512.1.el10_0?arch=ppc64le\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.ppc64le", "product": { "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.ppc64le", "product_id": "perl-mro-debuginfo-0:1.29-512.1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.29-512.1.el10_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "perl-4:5.40.2-512.1.el10_0.x86_64", "product": { "name": "perl-4:5.40.2-512.1.el10_0.x86_64", "product_id": "perl-4:5.40.2-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl@5.40.2-512.1.el10_0?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-B-0:1.89-512.1.el10_0.x86_64", "product": { "name": "perl-B-0:1.89-512.1.el10_0.x86_64", "product_id": "perl-B-0:1.89-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-B@1.89-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.x86_64", "product": { "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.x86_64", "product_id": "perl-Devel-Peek-0:1.34-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Devel-Peek@1.34-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DynaLoader-0:1.56-512.1.el10_0.x86_64", "product": { "name": "perl-DynaLoader-0:1.56-512.1.el10_0.x86_64", "product_id": "perl-DynaLoader-0:1.56-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DynaLoader@1.56-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Errno-0:1.38-512.1.el10_0.x86_64", "product": { "name": "perl-Errno-0:1.38-512.1.el10_0.x86_64", "product_id": "perl-Errno-0:1.38-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Errno@1.38-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Fcntl-0:1.18-512.1.el10_0.x86_64", "product": { "name": "perl-Fcntl-0:1.18-512.1.el10_0.x86_64", "product_id": "perl-Fcntl-0:1.18-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Fcntl@1.18-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.x86_64", "product": { "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.x86_64", "product_id": "perl-File-DosGlob-0:1.12-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-GDBM_File-1:1.24-512.1.el10_0.x86_64", "product": { "name": "perl-GDBM_File-1:1.24-512.1.el10_0.x86_64", "product_id": "perl-GDBM_File-1:1.24-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-GDBM_File@1.24-512.1.el10_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-Hash-Util-0:0.32-512.1.el10_0.x86_64", "product": { "name": "perl-Hash-Util-0:0.32-512.1.el10_0.x86_64", "product_id": "perl-Hash-Util-0:0.32-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util@0.32-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.x86_64", "product": { "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.x86_64", "product_id": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.27-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.x86_64", "product": { "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.x86_64", "product_id": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.24-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-IO-0:1.55-512.1.el10_0.x86_64", "product": { "name": "perl-IO-0:1.55-512.1.el10_0.x86_64", "product_id": "perl-IO-0:1.55-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-IO@1.55-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-NDBM_File-0:1.17-512.1.el10_0.x86_64", "product": { "name": "perl-NDBM_File-0:1.17-512.1.el10_0.x86_64", "product_id": "perl-NDBM_File-0:1.17-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-NDBM_File@1.17-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-ODBM_File-0:1.18-512.1.el10_0.x86_64", "product": { "name": "perl-ODBM_File-0:1.18-512.1.el10_0.x86_64", "product_id": "perl-ODBM_File-0:1.18-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ODBM_File@1.18-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Opcode-0:1.65-512.1.el10_0.x86_64", "product": { "name": "perl-Opcode-0:1.65-512.1.el10_0.x86_64", "product_id": "perl-Opcode-0:1.65-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Opcode@1.65-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-POSIX-0:2.20-512.1.el10_0.x86_64", "product": { "name": "perl-POSIX-0:2.20-512.1.el10_0.x86_64", "product_id": "perl-POSIX-0:2.20-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-POSIX@2.20-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.x86_64", "product": { "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.x86_64", "product_id": "perl-Sys-Hostname-0:1.25-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.25-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.x86_64", "product": { "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.x86_64", "product_id": "perl-Time-Piece-0:1.3401-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-devel-4:5.40.2-512.1.el10_0.x86_64", "product": { "name": "perl-devel-4:5.40.2-512.1.el10_0.x86_64", "product_id": "perl-devel-4:5.40.2-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-devel@5.40.2-512.1.el10_0?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-interpreter-4:5.40.2-512.1.el10_0.x86_64", "product": { "name": "perl-interpreter-4:5.40.2-512.1.el10_0.x86_64", "product_id": "perl-interpreter-4:5.40.2-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-interpreter@5.40.2-512.1.el10_0?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-lib-0:0.65-512.1.el10_0.x86_64", "product": { "name": "perl-lib-0:0.65-512.1.el10_0.x86_64", "product_id": "perl-lib-0:0.65-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-lib@0.65-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-libs-4:5.40.2-512.1.el10_0.x86_64", "product": { "name": "perl-libs-4:5.40.2-512.1.el10_0.x86_64", "product_id": "perl-libs-4:5.40.2-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-libs@5.40.2-512.1.el10_0?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-mro-0:1.29-512.1.el10_0.x86_64", "product": { "name": "perl-mro-0:1.29-512.1.el10_0.x86_64", "product_id": "perl-mro-0:1.29-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-mro@1.29-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-ph-0:5.40.2-512.1.el10_0.x86_64", "product": { "name": "perl-ph-0:5.40.2-512.1.el10_0.x86_64", "product_id": "perl-ph-0:5.40.2-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ph@5.40.2-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-debugsource-4:5.40.2-512.1.el10_0.x86_64", "product": { "name": "perl-debugsource-4:5.40.2-512.1.el10_0.x86_64", "product_id": "perl-debugsource-4:5.40.2-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-debugsource@5.40.2-512.1.el10_0?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.x86_64", "product": { "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.x86_64", "product_id": "perl-B-debuginfo-0:1.89-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-B-debuginfo@1.89-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.x86_64", "product": { "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.x86_64", "product_id": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.34-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.x86_64", "product": { "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.x86_64", "product_id": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.18-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.x86_64", "product": { "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.x86_64", "product_id": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.x86_64", "product": { "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.x86_64", "product_id": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.24-512.1.el10_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.x86_64", "product": { "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.x86_64", "product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.27-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.x86_64", "product": { "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.x86_64", "product_id": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.32-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.x86_64", "product": { "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.x86_64", "product_id": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.24-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.x86_64", "product": { "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.x86_64", "product_id": "perl-IO-debuginfo-0:1.55-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.55-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.x86_64", "product": { "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.x86_64", "product_id": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.17-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.x86_64", "product": { "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.x86_64", "product_id": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.18-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.x86_64", "product": { "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.x86_64", "product_id": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.65-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.x86_64", "product": { "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.x86_64", "product_id": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@2.20-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.x86_64", "product": { "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.x86_64", "product_id": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.25-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.x86_64", "product": { "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.x86_64", "product_id": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-512.1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "product": { "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "product_id": "perl-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-debuginfo@5.40.2-512.1.el10_0?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "product": { "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "product_id": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.40.2-512.1.el10_0?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "product": { "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "product_id": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.40.2-512.1.el10_0?arch=x86_64\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.x86_64", "product": { "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.x86_64", "product_id": "perl-mro-debuginfo-0:1.29-512.1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.29-512.1.el10_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "perl-4:5.40.2-512.1.el10_0.s390x", "product": { "name": "perl-4:5.40.2-512.1.el10_0.s390x", "product_id": "perl-4:5.40.2-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl@5.40.2-512.1.el10_0?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-B-0:1.89-512.1.el10_0.s390x", "product": { "name": "perl-B-0:1.89-512.1.el10_0.s390x", "product_id": "perl-B-0:1.89-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-B@1.89-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.s390x", "product": { "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.s390x", "product_id": "perl-Devel-Peek-0:1.34-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Devel-Peek@1.34-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-DynaLoader-0:1.56-512.1.el10_0.s390x", "product": { "name": "perl-DynaLoader-0:1.56-512.1.el10_0.s390x", "product_id": "perl-DynaLoader-0:1.56-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DynaLoader@1.56-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Errno-0:1.38-512.1.el10_0.s390x", "product": { "name": "perl-Errno-0:1.38-512.1.el10_0.s390x", "product_id": "perl-Errno-0:1.38-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Errno@1.38-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Fcntl-0:1.18-512.1.el10_0.s390x", "product": { "name": "perl-Fcntl-0:1.18-512.1.el10_0.s390x", "product_id": "perl-Fcntl-0:1.18-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Fcntl@1.18-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.s390x", "product": { "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.s390x", "product_id": "perl-File-DosGlob-0:1.12-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-GDBM_File-1:1.24-512.1.el10_0.s390x", "product": { "name": "perl-GDBM_File-1:1.24-512.1.el10_0.s390x", "product_id": "perl-GDBM_File-1:1.24-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-GDBM_File@1.24-512.1.el10_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-Hash-Util-0:0.32-512.1.el10_0.s390x", "product": { "name": "perl-Hash-Util-0:0.32-512.1.el10_0.s390x", "product_id": "perl-Hash-Util-0:0.32-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util@0.32-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.s390x", "product": { "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.s390x", "product_id": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.27-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.s390x", "product": { "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.s390x", "product_id": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.24-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-IO-0:1.55-512.1.el10_0.s390x", "product": { "name": "perl-IO-0:1.55-512.1.el10_0.s390x", "product_id": "perl-IO-0:1.55-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-IO@1.55-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-NDBM_File-0:1.17-512.1.el10_0.s390x", "product": { "name": "perl-NDBM_File-0:1.17-512.1.el10_0.s390x", "product_id": "perl-NDBM_File-0:1.17-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-NDBM_File@1.17-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-ODBM_File-0:1.18-512.1.el10_0.s390x", "product": { "name": "perl-ODBM_File-0:1.18-512.1.el10_0.s390x", "product_id": "perl-ODBM_File-0:1.18-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ODBM_File@1.18-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Opcode-0:1.65-512.1.el10_0.s390x", "product": { "name": "perl-Opcode-0:1.65-512.1.el10_0.s390x", "product_id": "perl-Opcode-0:1.65-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Opcode@1.65-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-POSIX-0:2.20-512.1.el10_0.s390x", "product": { "name": "perl-POSIX-0:2.20-512.1.el10_0.s390x", "product_id": "perl-POSIX-0:2.20-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-POSIX@2.20-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.s390x", "product": { "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.s390x", "product_id": "perl-Sys-Hostname-0:1.25-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.25-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.s390x", "product": { "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.s390x", "product_id": "perl-Time-Piece-0:1.3401-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-devel-4:5.40.2-512.1.el10_0.s390x", "product": { "name": "perl-devel-4:5.40.2-512.1.el10_0.s390x", "product_id": "perl-devel-4:5.40.2-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-devel@5.40.2-512.1.el10_0?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-interpreter-4:5.40.2-512.1.el10_0.s390x", "product": { "name": "perl-interpreter-4:5.40.2-512.1.el10_0.s390x", "product_id": "perl-interpreter-4:5.40.2-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-interpreter@5.40.2-512.1.el10_0?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-lib-0:0.65-512.1.el10_0.s390x", "product": { "name": "perl-lib-0:0.65-512.1.el10_0.s390x", "product_id": "perl-lib-0:0.65-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-lib@0.65-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-libs-4:5.40.2-512.1.el10_0.s390x", "product": { "name": "perl-libs-4:5.40.2-512.1.el10_0.s390x", "product_id": "perl-libs-4:5.40.2-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-libs@5.40.2-512.1.el10_0?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-mro-0:1.29-512.1.el10_0.s390x", "product": { "name": "perl-mro-0:1.29-512.1.el10_0.s390x", "product_id": "perl-mro-0:1.29-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-mro@1.29-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-ph-0:5.40.2-512.1.el10_0.s390x", "product": { "name": "perl-ph-0:5.40.2-512.1.el10_0.s390x", "product_id": "perl-ph-0:5.40.2-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ph@5.40.2-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-debugsource-4:5.40.2-512.1.el10_0.s390x", "product": { "name": "perl-debugsource-4:5.40.2-512.1.el10_0.s390x", "product_id": "perl-debugsource-4:5.40.2-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-debugsource@5.40.2-512.1.el10_0?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.s390x", "product": { "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.s390x", "product_id": "perl-B-debuginfo-0:1.89-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-B-debuginfo@1.89-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.s390x", "product": { "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.s390x", "product_id": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.34-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.s390x", "product": { "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.s390x", "product_id": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.18-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.s390x", "product": { "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.s390x", "product_id": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.s390x", "product": { "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.s390x", "product_id": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.24-512.1.el10_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.s390x", "product": { "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.s390x", "product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.27-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.s390x", "product": { "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.s390x", "product_id": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.32-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.s390x", "product": { "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.s390x", "product_id": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.24-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.s390x", "product": { "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.s390x", "product_id": "perl-IO-debuginfo-0:1.55-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.55-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.s390x", "product": { "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.s390x", "product_id": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.17-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.s390x", "product": { "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.s390x", "product_id": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.18-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.s390x", "product": { "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.s390x", "product_id": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.65-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.s390x", "product": { "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.s390x", "product_id": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@2.20-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.s390x", "product": { "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.s390x", "product_id": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.25-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.s390x", "product": { "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.s390x", "product_id": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-512.1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.s390x", "product": { "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.s390x", "product_id": "perl-debuginfo-4:5.40.2-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-debuginfo@5.40.2-512.1.el10_0?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.s390x", "product": { "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.s390x", "product_id": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.40.2-512.1.el10_0?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.s390x", "product": { "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.s390x", "product_id": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.40.2-512.1.el10_0?arch=s390x\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.s390x", "product": { "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.s390x", "product_id": "perl-mro-debuginfo-0:1.29-512.1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.29-512.1.el10_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "perl-Attribute-Handlers-0:1.03-512.1.el10_0.noarch", "product": { "name": "perl-Attribute-Handlers-0:1.03-512.1.el10_0.noarch", "product_id": "perl-Attribute-Handlers-0:1.03-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Attribute-Handlers@1.03-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-AutoLoader-0:5.74-512.1.el10_0.noarch", "product": { "name": "perl-AutoLoader-0:5.74-512.1.el10_0.noarch", "product_id": "perl-AutoLoader-0:5.74-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-AutoLoader@5.74-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-AutoSplit-0:5.74-512.1.el10_0.noarch", "product": { "name": "perl-AutoSplit-0:5.74-512.1.el10_0.noarch", "product_id": "perl-AutoSplit-0:5.74-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-AutoSplit@5.74-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Benchmark-0:1.25-512.1.el10_0.noarch", "product": { "name": "perl-Benchmark-0:1.25-512.1.el10_0.noarch", "product_id": "perl-Benchmark-0:1.25-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Benchmark@1.25-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Class-Struct-0:0.68-512.1.el10_0.noarch", "product": { "name": "perl-Class-Struct-0:0.68-512.1.el10_0.noarch", "product_id": "perl-Class-Struct-0:0.68-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Class-Struct@0.68-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Config-Extensions-0:0.03-512.1.el10_0.noarch", "product": { "name": "perl-Config-Extensions-0:0.03-512.1.el10_0.noarch", "product_id": "perl-Config-Extensions-0:0.03-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Config-Extensions@0.03-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-DBM_Filter-0:0.06-512.1.el10_0.noarch", "product": { "name": "perl-DBM_Filter-0:0.06-512.1.el10_0.noarch", "product_id": "perl-DBM_Filter-0:0.06-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBM_Filter@0.06-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Devel-SelfStubber-0:1.06-512.1.el10_0.noarch", "product": { "name": "perl-Devel-SelfStubber-0:1.06-512.1.el10_0.noarch", "product_id": "perl-Devel-SelfStubber-0:1.06-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Devel-SelfStubber@1.06-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-DirHandle-0:1.05-512.1.el10_0.noarch", "product": { "name": "perl-DirHandle-0:1.05-512.1.el10_0.noarch", "product_id": "perl-DirHandle-0:1.05-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DirHandle@1.05-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Dumpvalue-0:2.27-512.1.el10_0.noarch", "product": { "name": "perl-Dumpvalue-0:2.27-512.1.el10_0.noarch", "product_id": "perl-Dumpvalue-0:2.27-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Dumpvalue@2.27-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-English-0:1.11-512.1.el10_0.noarch", "product": { "name": "perl-English-0:1.11-512.1.el10_0.noarch", "product_id": "perl-English-0:1.11-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-English@1.11-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-ExtUtils-Constant-0:0.25-512.1.el10_0.noarch", "product": { "name": "perl-ExtUtils-Constant-0:0.25-512.1.el10_0.noarch", "product_id": "perl-ExtUtils-Constant-0:0.25-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ExtUtils-Constant@0.25-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-ExtUtils-Embed-0:1.35-512.1.el10_0.noarch", "product": { "name": "perl-ExtUtils-Embed-0:1.35-512.1.el10_0.noarch", "product_id": "perl-ExtUtils-Embed-0:1.35-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ExtUtils-Embed@1.35-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-ExtUtils-Miniperl-0:1.14-512.1.el10_0.noarch", "product": { "name": "perl-ExtUtils-Miniperl-0:1.14-512.1.el10_0.noarch", "product_id": "perl-ExtUtils-Miniperl-0:1.14-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-ExtUtils-Miniperl@1.14-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-File-Basename-0:2.86-512.1.el10_0.noarch", "product": { "name": "perl-File-Basename-0:2.86-512.1.el10_0.noarch", "product_id": "perl-File-Basename-0:2.86-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-Basename@2.86-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-File-Compare-0:1.100.800-512.1.el10_0.noarch", "product": { "name": "perl-File-Compare-0:1.100.800-512.1.el10_0.noarch", "product_id": "perl-File-Compare-0:1.100.800-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-Compare@1.100.800-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-File-Copy-0:2.41-512.1.el10_0.noarch", "product": { "name": "perl-File-Copy-0:2.41-512.1.el10_0.noarch", "product_id": "perl-File-Copy-0:2.41-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-Copy@2.41-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-File-Find-0:1.44-512.1.el10_0.noarch", "product": { "name": "perl-File-Find-0:1.44-512.1.el10_0.noarch", "product_id": "perl-File-Find-0:1.44-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-Find@1.44-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-File-stat-0:1.14-512.1.el10_0.noarch", "product": { "name": "perl-File-stat-0:1.14-512.1.el10_0.noarch", "product_id": "perl-File-stat-0:1.14-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-File-stat@1.14-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-FileCache-0:1.10-512.1.el10_0.noarch", "product": { "name": "perl-FileCache-0:1.10-512.1.el10_0.noarch", "product_id": "perl-FileCache-0:1.10-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-FileCache@1.10-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-FileHandle-0:2.05-512.1.el10_0.noarch", "product": { "name": "perl-FileHandle-0:2.05-512.1.el10_0.noarch", "product_id": "perl-FileHandle-0:2.05-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-FileHandle@2.05-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-FindBin-0:1.54-512.1.el10_0.noarch", "product": { "name": "perl-FindBin-0:1.54-512.1.el10_0.noarch", "product_id": "perl-FindBin-0:1.54-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-FindBin@1.54-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Getopt-Std-0:1.14-512.1.el10_0.noarch", "product": { "name": "perl-Getopt-Std-0:1.14-512.1.el10_0.noarch", "product_id": "perl-Getopt-Std-0:1.14-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Getopt-Std@1.14-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-I18N-Collate-0:1.02-512.1.el10_0.noarch", "product": { "name": "perl-I18N-Collate-0:1.02-512.1.el10_0.noarch", "product_id": "perl-I18N-Collate-0:1.02-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-Collate@1.02-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-I18N-LangTags-0:0.45-512.1.el10_0.noarch", "product": { "name": "perl-I18N-LangTags-0:0.45-512.1.el10_0.noarch", "product_id": "perl-I18N-LangTags-0:0.45-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-I18N-LangTags@0.45-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-IPC-Open3-0:1.22-512.1.el10_0.noarch", "product": { "name": "perl-IPC-Open3-0:1.22-512.1.el10_0.noarch", "product_id": "perl-IPC-Open3-0:1.22-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-IPC-Open3@1.22-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Locale-Maketext-Simple-1:0.21-512.1.el10_0.noarch", "product": { "name": "perl-Locale-Maketext-Simple-1:0.21-512.1.el10_0.noarch", "product_id": "perl-Locale-Maketext-Simple-1:0.21-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Locale-Maketext-Simple@0.21-512.1.el10_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-Math-Complex-0:1.62-512.1.el10_0.noarch", "product": { "name": "perl-Math-Complex-0:1.62-512.1.el10_0.noarch", "product_id": "perl-Math-Complex-0:1.62-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Math-Complex@1.62-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Memoize-0:1.16-512.1.el10_0.noarch", "product": { "name": "perl-Memoize-0:1.16-512.1.el10_0.noarch", "product_id": "perl-Memoize-0:1.16-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Memoize@1.16-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Module-Loaded-1:0.08-512.1.el10_0.noarch", "product": { "name": "perl-Module-Loaded-1:0.08-512.1.el10_0.noarch", "product_id": "perl-Module-Loaded-1:0.08-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Module-Loaded@0.08-512.1.el10_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "perl-NEXT-0:0.69-512.1.el10_0.noarch", "product": { "name": "perl-NEXT-0:0.69-512.1.el10_0.noarch", "product_id": "perl-NEXT-0:0.69-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-NEXT@0.69-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Net-0:1.04-512.1.el10_0.noarch", "product": { "name": "perl-Net-0:1.04-512.1.el10_0.noarch", "product_id": "perl-Net-0:1.04-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Net@1.04-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Pod-Functions-0:1.14-512.1.el10_0.noarch", "product": { "name": "perl-Pod-Functions-0:1.14-512.1.el10_0.noarch", "product_id": "perl-Pod-Functions-0:1.14-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Pod-Functions@1.14-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Pod-Html-0:1.35-512.1.el10_0.noarch", "product": { "name": "perl-Pod-Html-0:1.35-512.1.el10_0.noarch", "product_id": "perl-Pod-Html-0:1.35-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Pod-Html@1.35-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Safe-0:2.46-512.1.el10_0.noarch", "product": { "name": "perl-Safe-0:2.46-512.1.el10_0.noarch", "product_id": "perl-Safe-0:2.46-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Safe@2.46-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Search-Dict-0:1.07-512.1.el10_0.noarch", "product": { "name": "perl-Search-Dict-0:1.07-512.1.el10_0.noarch", "product_id": "perl-Search-Dict-0:1.07-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Search-Dict@1.07-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-SelectSaver-0:1.02-512.1.el10_0.noarch", "product": { "name": "perl-SelectSaver-0:1.02-512.1.el10_0.noarch", "product_id": "perl-SelectSaver-0:1.02-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-SelectSaver@1.02-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-SelfLoader-0:1.27-512.1.el10_0.noarch", "product": { "name": "perl-SelfLoader-0:1.27-512.1.el10_0.noarch", "product_id": "perl-SelfLoader-0:1.27-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-SelfLoader@1.27-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Symbol-0:1.09-512.1.el10_0.noarch", "product": { "name": "perl-Symbol-0:1.09-512.1.el10_0.noarch", "product_id": "perl-Symbol-0:1.09-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Symbol@1.09-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Term-Complete-0:1.403-512.1.el10_0.noarch", "product": { "name": "perl-Term-Complete-0:1.403-512.1.el10_0.noarch", "product_id": "perl-Term-Complete-0:1.403-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Term-Complete@1.403-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Term-ReadLine-0:1.17-512.1.el10_0.noarch", "product": { "name": "perl-Term-ReadLine-0:1.17-512.1.el10_0.noarch", "product_id": "perl-Term-ReadLine-0:1.17-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Term-ReadLine@1.17-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Test-0:1.31-512.1.el10_0.noarch", "product": { "name": "perl-Test-0:1.31-512.1.el10_0.noarch", "product_id": "perl-Test-0:1.31-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Test@1.31-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Text-Abbrev-0:1.02-512.1.el10_0.noarch", "product": { "name": "perl-Text-Abbrev-0:1.02-512.1.el10_0.noarch", "product_id": "perl-Text-Abbrev-0:1.02-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Text-Abbrev@1.02-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Thread-0:3.05-512.1.el10_0.noarch", "product": { "name": "perl-Thread-0:3.05-512.1.el10_0.noarch", "product_id": "perl-Thread-0:3.05-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Thread@3.05-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Thread-Semaphore-0:2.13-512.1.el10_0.noarch", "product": { "name": "perl-Thread-Semaphore-0:2.13-512.1.el10_0.noarch", "product_id": "perl-Thread-Semaphore-0:2.13-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Thread-Semaphore@2.13-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Tie-0:4.6-512.1.el10_0.noarch", "product": { "name": "perl-Tie-0:4.6-512.1.el10_0.noarch", "product_id": "perl-Tie-0:4.6-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Tie@4.6-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Tie-File-0:1.09-512.1.el10_0.noarch", "product": { "name": "perl-Tie-File-0:1.09-512.1.el10_0.noarch", "product_id": "perl-Tie-File-0:1.09-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Tie-File@1.09-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Tie-Memoize-0:1.1-512.1.el10_0.noarch", "product": { "name": "perl-Tie-Memoize-0:1.1-512.1.el10_0.noarch", "product_id": "perl-Tie-Memoize-0:1.1-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Tie-Memoize@1.1-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Time-0:1.04-512.1.el10_0.noarch", "product": { "name": "perl-Time-0:1.04-512.1.el10_0.noarch", "product_id": "perl-Time-0:1.04-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Time@1.04-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-Unicode-UCD-0:0.78-512.1.el10_0.noarch", "product": { "name": "perl-Unicode-UCD-0:0.78-512.1.el10_0.noarch", "product_id": "perl-Unicode-UCD-0:0.78-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-Unicode-UCD@0.78-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-User-pwent-0:1.05-512.1.el10_0.noarch", "product": { "name": "perl-User-pwent-0:1.05-512.1.el10_0.noarch", "product_id": "perl-User-pwent-0:1.05-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-User-pwent@1.05-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-autouse-0:1.11-512.1.el10_0.noarch", "product": { "name": "perl-autouse-0:1.11-512.1.el10_0.noarch", "product_id": "perl-autouse-0:1.11-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-autouse@1.11-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-base-0:2.27-512.1.el10_0.noarch", "product": { "name": "perl-base-0:2.27-512.1.el10_0.noarch", "product_id": "perl-base-0:2.27-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-base@2.27-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-blib-0:1.07-512.1.el10_0.noarch", "product": { "name": "perl-blib-0:1.07-512.1.el10_0.noarch", "product_id": "perl-blib-0:1.07-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-blib@1.07-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-debugger-0:1.60-512.1.el10_0.noarch", "product": { "name": "perl-debugger-0:1.60-512.1.el10_0.noarch", "product_id": "perl-debugger-0:1.60-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-debugger@1.60-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-deprecate-0:0.04-512.1.el10_0.noarch", "product": { "name": "perl-deprecate-0:0.04-512.1.el10_0.noarch", "product_id": "perl-deprecate-0:0.04-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-deprecate@0.04-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-diagnostics-0:1.40-512.1.el10_0.noarch", "product": { "name": "perl-diagnostics-0:1.40-512.1.el10_0.noarch", "product_id": "perl-diagnostics-0:1.40-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-diagnostics@1.40-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-doc-0:5.40.2-512.1.el10_0.noarch", "product": { "name": "perl-doc-0:5.40.2-512.1.el10_0.noarch", "product_id": "perl-doc-0:5.40.2-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-doc@5.40.2-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-encoding-warnings-0:0.14-512.1.el10_0.noarch", "product": { "name": "perl-encoding-warnings-0:0.14-512.1.el10_0.noarch", "product_id": "perl-encoding-warnings-0:0.14-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-encoding-warnings@0.14-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-fields-0:2.27-512.1.el10_0.noarch", "product": { "name": "perl-fields-0:2.27-512.1.el10_0.noarch", "product_id": "perl-fields-0:2.27-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-fields@2.27-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-filetest-0:1.03-512.1.el10_0.noarch", "product": { "name": "perl-filetest-0:1.03-512.1.el10_0.noarch", "product_id": "perl-filetest-0:1.03-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-filetest@1.03-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-if-0:0.61.000-512.1.el10_0.noarch", "product": { "name": "perl-if-0:0.61.000-512.1.el10_0.noarch", "product_id": "perl-if-0:0.61.000-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-if@0.61.000-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-less-0:0.03-512.1.el10_0.noarch", "product": { "name": "perl-less-0:0.03-512.1.el10_0.noarch", "product_id": "perl-less-0:0.03-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-less@0.03-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-libnetcfg-4:5.40.2-512.1.el10_0.noarch", "product": { "name": "perl-libnetcfg-4:5.40.2-512.1.el10_0.noarch", "product_id": "perl-libnetcfg-4:5.40.2-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-libnetcfg@5.40.2-512.1.el10_0?arch=noarch\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-locale-0:1.12-512.1.el10_0.noarch", "product": { "name": "perl-locale-0:1.12-512.1.el10_0.noarch", "product_id": "perl-locale-0:1.12-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-locale@1.12-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-macros-4:5.40.2-512.1.el10_0.noarch", "product": { "name": "perl-macros-4:5.40.2-512.1.el10_0.noarch", "product_id": "perl-macros-4:5.40.2-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-macros@5.40.2-512.1.el10_0?arch=noarch\u0026epoch=4" } } }, { "category": "product_version", "name": "perl-meta-notation-0:5.40.2-512.1.el10_0.noarch", "product": { "name": "perl-meta-notation-0:5.40.2-512.1.el10_0.noarch", "product_id": "perl-meta-notation-0:5.40.2-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-meta-notation@5.40.2-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-open-0:1.13-512.1.el10_0.noarch", "product": { "name": "perl-open-0:1.13-512.1.el10_0.noarch", "product_id": "perl-open-0:1.13-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-open@1.13-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-overload-0:1.37-512.1.el10_0.noarch", "product": { "name": "perl-overload-0:1.37-512.1.el10_0.noarch", "product_id": "perl-overload-0:1.37-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-overload@1.37-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-overloading-0:0.02-512.1.el10_0.noarch", "product": { "name": "perl-overloading-0:0.02-512.1.el10_0.noarch", "product_id": "perl-overloading-0:0.02-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-overloading@0.02-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-sigtrap-0:1.10-512.1.el10_0.noarch", "product": { "name": "perl-sigtrap-0:1.10-512.1.el10_0.noarch", "product_id": "perl-sigtrap-0:1.10-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-sigtrap@1.10-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-sort-0:2.05-512.1.el10_0.noarch", "product": { "name": "perl-sort-0:2.05-512.1.el10_0.noarch", "product_id": "perl-sort-0:2.05-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-sort@2.05-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-subs-0:1.04-512.1.el10_0.noarch", "product": { "name": "perl-subs-0:1.04-512.1.el10_0.noarch", "product_id": "perl-subs-0:1.04-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-subs@1.04-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-utils-0:5.40.2-512.1.el10_0.noarch", "product": { "name": "perl-utils-0:5.40.2-512.1.el10_0.noarch", "product_id": "perl-utils-0:5.40.2-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-utils@5.40.2-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-vars-0:1.05-512.1.el10_0.noarch", "product": { "name": "perl-vars-0:1.05-512.1.el10_0.noarch", "product_id": "perl-vars-0:1.05-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-vars@1.05-512.1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "perl-vmsish-0:1.04-512.1.el10_0.noarch", "product": { "name": "perl-vmsish-0:1.04-512.1.el10_0.noarch", "product_id": "perl-vmsish-0:1.04-512.1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-vmsish@1.04-512.1.el10_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "perl-4:5.40.2-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.aarch64" }, "product_reference": "perl-4:5.40.2-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-4:5.40.2-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.ppc64le" }, "product_reference": "perl-4:5.40.2-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-4:5.40.2-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.s390x" }, "product_reference": "perl-4:5.40.2-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-4:5.40.2-512.1.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.src" }, "product_reference": "perl-4:5.40.2-512.1.el10_0.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-4:5.40.2-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.x86_64" }, "product_reference": "perl-4:5.40.2-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Attribute-Handlers-0:1.03-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Attribute-Handlers-0:1.03-512.1.el10_0.noarch" }, "product_reference": "perl-Attribute-Handlers-0:1.03-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-AutoLoader-0:5.74-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-AutoLoader-0:5.74-512.1.el10_0.noarch" }, "product_reference": "perl-AutoLoader-0:5.74-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-AutoSplit-0:5.74-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-AutoSplit-0:5.74-512.1.el10_0.noarch" }, "product_reference": "perl-AutoSplit-0:5.74-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-B-0:1.89-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.aarch64" }, "product_reference": "perl-B-0:1.89-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-B-0:1.89-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.ppc64le" }, "product_reference": "perl-B-0:1.89-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-B-0:1.89-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.s390x" }, "product_reference": "perl-B-0:1.89-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-B-0:1.89-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.x86_64" }, "product_reference": "perl-B-0:1.89-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.aarch64" }, "product_reference": "perl-B-debuginfo-0:1.89-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.ppc64le" }, "product_reference": "perl-B-debuginfo-0:1.89-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.s390x" }, "product_reference": "perl-B-debuginfo-0:1.89-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-B-debuginfo-0:1.89-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.x86_64" }, "product_reference": "perl-B-debuginfo-0:1.89-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Benchmark-0:1.25-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Benchmark-0:1.25-512.1.el10_0.noarch" }, "product_reference": "perl-Benchmark-0:1.25-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Class-Struct-0:0.68-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Class-Struct-0:0.68-512.1.el10_0.noarch" }, "product_reference": "perl-Class-Struct-0:0.68-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Config-Extensions-0:0.03-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Config-Extensions-0:0.03-512.1.el10_0.noarch" }, "product_reference": "perl-Config-Extensions-0:0.03-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBM_Filter-0:0.06-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-DBM_Filter-0:0.06-512.1.el10_0.noarch" }, "product_reference": "perl-DBM_Filter-0:0.06-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.aarch64" }, "product_reference": "perl-Devel-Peek-0:1.34-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.ppc64le" }, "product_reference": "perl-Devel-Peek-0:1.34-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.s390x" }, "product_reference": "perl-Devel-Peek-0:1.34-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Devel-Peek-0:1.34-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.x86_64" }, "product_reference": "perl-Devel-Peek-0:1.34-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.aarch64" }, "product_reference": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.ppc64le" }, "product_reference": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.s390x" }, "product_reference": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.x86_64" }, "product_reference": "perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Devel-SelfStubber-0:1.06-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Devel-SelfStubber-0:1.06-512.1.el10_0.noarch" }, "product_reference": "perl-Devel-SelfStubber-0:1.06-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DirHandle-0:1.05-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-DirHandle-0:1.05-512.1.el10_0.noarch" }, "product_reference": "perl-DirHandle-0:1.05-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Dumpvalue-0:2.27-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Dumpvalue-0:2.27-512.1.el10_0.noarch" }, "product_reference": "perl-Dumpvalue-0:2.27-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DynaLoader-0:1.56-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.aarch64" }, "product_reference": "perl-DynaLoader-0:1.56-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DynaLoader-0:1.56-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.ppc64le" }, "product_reference": "perl-DynaLoader-0:1.56-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DynaLoader-0:1.56-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.s390x" }, "product_reference": "perl-DynaLoader-0:1.56-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DynaLoader-0:1.56-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.x86_64" }, "product_reference": "perl-DynaLoader-0:1.56-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-English-0:1.11-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-English-0:1.11-512.1.el10_0.noarch" }, "product_reference": "perl-English-0:1.11-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Errno-0:1.38-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.aarch64" }, "product_reference": "perl-Errno-0:1.38-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Errno-0:1.38-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.ppc64le" }, "product_reference": "perl-Errno-0:1.38-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Errno-0:1.38-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.s390x" }, "product_reference": "perl-Errno-0:1.38-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Errno-0:1.38-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.x86_64" }, "product_reference": "perl-Errno-0:1.38-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ExtUtils-Constant-0:0.25-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ExtUtils-Constant-0:0.25-512.1.el10_0.noarch" }, "product_reference": "perl-ExtUtils-Constant-0:0.25-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ExtUtils-Embed-0:1.35-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ExtUtils-Embed-0:1.35-512.1.el10_0.noarch" }, "product_reference": "perl-ExtUtils-Embed-0:1.35-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ExtUtils-Miniperl-0:1.14-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ExtUtils-Miniperl-0:1.14-512.1.el10_0.noarch" }, "product_reference": "perl-ExtUtils-Miniperl-0:1.14-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Fcntl-0:1.18-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.aarch64" }, "product_reference": "perl-Fcntl-0:1.18-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Fcntl-0:1.18-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.ppc64le" }, "product_reference": "perl-Fcntl-0:1.18-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Fcntl-0:1.18-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.s390x" }, "product_reference": "perl-Fcntl-0:1.18-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Fcntl-0:1.18-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.x86_64" }, "product_reference": "perl-Fcntl-0:1.18-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.aarch64" }, "product_reference": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.ppc64le" }, "product_reference": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.s390x" }, "product_reference": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.x86_64" }, "product_reference": "perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-Basename-0:2.86-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-Basename-0:2.86-512.1.el10_0.noarch" }, "product_reference": "perl-File-Basename-0:2.86-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-Compare-0:1.100.800-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-Compare-0:1.100.800-512.1.el10_0.noarch" }, "product_reference": "perl-File-Compare-0:1.100.800-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-Copy-0:2.41-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-Copy-0:2.41-512.1.el10_0.noarch" }, "product_reference": "perl-File-Copy-0:2.41-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.aarch64" }, "product_reference": "perl-File-DosGlob-0:1.12-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.ppc64le" }, "product_reference": "perl-File-DosGlob-0:1.12-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.s390x" }, "product_reference": "perl-File-DosGlob-0:1.12-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-DosGlob-0:1.12-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.x86_64" }, "product_reference": "perl-File-DosGlob-0:1.12-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.aarch64" }, "product_reference": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.ppc64le" }, "product_reference": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.s390x" }, "product_reference": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.x86_64" }, "product_reference": "perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-Find-0:1.44-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-Find-0:1.44-512.1.el10_0.noarch" }, "product_reference": "perl-File-Find-0:1.44-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-File-stat-0:1.14-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-File-stat-0:1.14-512.1.el10_0.noarch" }, "product_reference": "perl-File-stat-0:1.14-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-FileCache-0:1.10-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-FileCache-0:1.10-512.1.el10_0.noarch" }, "product_reference": "perl-FileCache-0:1.10-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-FileHandle-0:2.05-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-FileHandle-0:2.05-512.1.el10_0.noarch" }, "product_reference": "perl-FileHandle-0:2.05-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-FindBin-0:1.54-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-FindBin-0:1.54-512.1.el10_0.noarch" }, "product_reference": "perl-FindBin-0:1.54-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GDBM_File-1:1.24-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.aarch64" }, "product_reference": "perl-GDBM_File-1:1.24-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GDBM_File-1:1.24-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.ppc64le" }, "product_reference": "perl-GDBM_File-1:1.24-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GDBM_File-1:1.24-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.s390x" }, "product_reference": "perl-GDBM_File-1:1.24-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GDBM_File-1:1.24-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.x86_64" }, "product_reference": "perl-GDBM_File-1:1.24-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.aarch64" }, "product_reference": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.ppc64le" }, "product_reference": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.s390x" }, "product_reference": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.x86_64" }, "product_reference": "perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Getopt-Std-0:1.14-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Getopt-Std-0:1.14-512.1.el10_0.noarch" }, "product_reference": "perl-Getopt-Std-0:1.14-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-0:0.32-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.aarch64" }, "product_reference": "perl-Hash-Util-0:0.32-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-0:0.32-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.ppc64le" }, "product_reference": "perl-Hash-Util-0:0.32-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-0:0.32-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.s390x" }, "product_reference": "perl-Hash-Util-0:0.32-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-0:0.32-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.x86_64" }, "product_reference": "perl-Hash-Util-0:0.32-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.aarch64" }, "product_reference": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.ppc64le" }, "product_reference": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.s390x" }, "product_reference": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.x86_64" }, "product_reference": "perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.aarch64" }, "product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.ppc64le" }, "product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.s390x" }, "product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.x86_64" }, "product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.aarch64" }, "product_reference": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.ppc64le" }, "product_reference": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.s390x" }, "product_reference": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.x86_64" }, "product_reference": "perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-Collate-0:1.02-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-Collate-0:1.02-512.1.el10_0.noarch" }, "product_reference": "perl-I18N-Collate-0:1.02-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-LangTags-0:0.45-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-LangTags-0:0.45-512.1.el10_0.noarch" }, "product_reference": "perl-I18N-LangTags-0:0.45-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.aarch64" }, "product_reference": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.ppc64le" }, "product_reference": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.s390x" }, "product_reference": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.x86_64" }, "product_reference": "perl-I18N-Langinfo-0:0.24-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.aarch64" }, "product_reference": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.ppc64le" }, "product_reference": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.s390x" }, "product_reference": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.x86_64" }, "product_reference": "perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-IO-0:1.55-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.aarch64" }, "product_reference": "perl-IO-0:1.55-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-IO-0:1.55-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.ppc64le" }, "product_reference": "perl-IO-0:1.55-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-IO-0:1.55-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.s390x" }, "product_reference": "perl-IO-0:1.55-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-IO-0:1.55-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.x86_64" }, "product_reference": "perl-IO-0:1.55-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.aarch64" }, "product_reference": "perl-IO-debuginfo-0:1.55-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.ppc64le" }, "product_reference": "perl-IO-debuginfo-0:1.55-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.s390x" }, "product_reference": "perl-IO-debuginfo-0:1.55-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-IO-debuginfo-0:1.55-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.x86_64" }, "product_reference": "perl-IO-debuginfo-0:1.55-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-IPC-Open3-0:1.22-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-IPC-Open3-0:1.22-512.1.el10_0.noarch" }, "product_reference": "perl-IPC-Open3-0:1.22-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Locale-Maketext-Simple-1:0.21-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Locale-Maketext-Simple-1:0.21-512.1.el10_0.noarch" }, "product_reference": "perl-Locale-Maketext-Simple-1:0.21-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Math-Complex-0:1.62-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Math-Complex-0:1.62-512.1.el10_0.noarch" }, "product_reference": "perl-Math-Complex-0:1.62-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Memoize-0:1.16-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Memoize-0:1.16-512.1.el10_0.noarch" }, "product_reference": "perl-Memoize-0:1.16-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Module-Loaded-1:0.08-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Module-Loaded-1:0.08-512.1.el10_0.noarch" }, "product_reference": "perl-Module-Loaded-1:0.08-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NDBM_File-0:1.17-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.aarch64" }, "product_reference": "perl-NDBM_File-0:1.17-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NDBM_File-0:1.17-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.ppc64le" }, "product_reference": "perl-NDBM_File-0:1.17-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NDBM_File-0:1.17-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.s390x" }, "product_reference": "perl-NDBM_File-0:1.17-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NDBM_File-0:1.17-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.x86_64" }, "product_reference": "perl-NDBM_File-0:1.17-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.aarch64" }, "product_reference": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.ppc64le" }, "product_reference": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.s390x" }, "product_reference": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.x86_64" }, "product_reference": "perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NEXT-0:0.69-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-NEXT-0:0.69-512.1.el10_0.noarch" }, "product_reference": "perl-NEXT-0:0.69-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Net-0:1.04-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Net-0:1.04-512.1.el10_0.noarch" }, "product_reference": "perl-Net-0:1.04-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ODBM_File-0:1.18-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.aarch64" }, "product_reference": "perl-ODBM_File-0:1.18-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ODBM_File-0:1.18-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.ppc64le" }, "product_reference": "perl-ODBM_File-0:1.18-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ODBM_File-0:1.18-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.s390x" }, "product_reference": "perl-ODBM_File-0:1.18-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ODBM_File-0:1.18-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.x86_64" }, "product_reference": "perl-ODBM_File-0:1.18-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.aarch64" }, "product_reference": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.ppc64le" }, "product_reference": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.s390x" }, "product_reference": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.x86_64" }, "product_reference": "perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Opcode-0:1.65-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.aarch64" }, "product_reference": "perl-Opcode-0:1.65-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Opcode-0:1.65-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.ppc64le" }, "product_reference": "perl-Opcode-0:1.65-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Opcode-0:1.65-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.s390x" }, "product_reference": "perl-Opcode-0:1.65-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Opcode-0:1.65-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.x86_64" }, "product_reference": "perl-Opcode-0:1.65-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.aarch64" }, "product_reference": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.ppc64le" }, "product_reference": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.s390x" }, "product_reference": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.x86_64" }, "product_reference": "perl-Opcode-debuginfo-0:1.65-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-POSIX-0:2.20-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.aarch64" }, "product_reference": "perl-POSIX-0:2.20-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-POSIX-0:2.20-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.ppc64le" }, "product_reference": "perl-POSIX-0:2.20-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-POSIX-0:2.20-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.s390x" }, "product_reference": "perl-POSIX-0:2.20-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-POSIX-0:2.20-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.x86_64" }, "product_reference": "perl-POSIX-0:2.20-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.aarch64" }, "product_reference": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.ppc64le" }, "product_reference": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.s390x" }, "product_reference": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.x86_64" }, "product_reference": "perl-POSIX-debuginfo-0:2.20-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Pod-Functions-0:1.14-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Pod-Functions-0:1.14-512.1.el10_0.noarch" }, "product_reference": "perl-Pod-Functions-0:1.14-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Pod-Html-0:1.35-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Pod-Html-0:1.35-512.1.el10_0.noarch" }, "product_reference": "perl-Pod-Html-0:1.35-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Safe-0:2.46-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Safe-0:2.46-512.1.el10_0.noarch" }, "product_reference": "perl-Safe-0:2.46-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Search-Dict-0:1.07-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Search-Dict-0:1.07-512.1.el10_0.noarch" }, "product_reference": "perl-Search-Dict-0:1.07-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SelectSaver-0:1.02-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-SelectSaver-0:1.02-512.1.el10_0.noarch" }, "product_reference": "perl-SelectSaver-0:1.02-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SelfLoader-0:1.27-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-SelfLoader-0:1.27-512.1.el10_0.noarch" }, "product_reference": "perl-SelfLoader-0:1.27-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Symbol-0:1.09-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Symbol-0:1.09-512.1.el10_0.noarch" }, "product_reference": "perl-Symbol-0:1.09-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.aarch64" }, "product_reference": "perl-Sys-Hostname-0:1.25-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.ppc64le" }, "product_reference": "perl-Sys-Hostname-0:1.25-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.s390x" }, "product_reference": "perl-Sys-Hostname-0:1.25-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Sys-Hostname-0:1.25-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.x86_64" }, "product_reference": "perl-Sys-Hostname-0:1.25-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.aarch64" }, "product_reference": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.ppc64le" }, "product_reference": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.s390x" }, "product_reference": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.x86_64" }, "product_reference": "perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Term-Complete-0:1.403-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Term-Complete-0:1.403-512.1.el10_0.noarch" }, "product_reference": "perl-Term-Complete-0:1.403-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Term-ReadLine-0:1.17-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Term-ReadLine-0:1.17-512.1.el10_0.noarch" }, "product_reference": "perl-Term-ReadLine-0:1.17-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Test-0:1.31-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Test-0:1.31-512.1.el10_0.noarch" }, "product_reference": "perl-Test-0:1.31-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Text-Abbrev-0:1.02-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Text-Abbrev-0:1.02-512.1.el10_0.noarch" }, "product_reference": "perl-Text-Abbrev-0:1.02-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Thread-0:3.05-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Thread-0:3.05-512.1.el10_0.noarch" }, "product_reference": "perl-Thread-0:3.05-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Thread-Semaphore-0:2.13-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Thread-Semaphore-0:2.13-512.1.el10_0.noarch" }, "product_reference": "perl-Thread-Semaphore-0:2.13-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Tie-0:4.6-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Tie-0:4.6-512.1.el10_0.noarch" }, "product_reference": "perl-Tie-0:4.6-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Tie-File-0:1.09-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Tie-File-0:1.09-512.1.el10_0.noarch" }, "product_reference": "perl-Tie-File-0:1.09-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Tie-Memoize-0:1.1-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Tie-Memoize-0:1.1-512.1.el10_0.noarch" }, "product_reference": "perl-Tie-Memoize-0:1.1-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Time-0:1.04-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Time-0:1.04-512.1.el10_0.noarch" }, "product_reference": "perl-Time-0:1.04-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.aarch64" }, "product_reference": "perl-Time-Piece-0:1.3401-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.ppc64le" }, "product_reference": "perl-Time-Piece-0:1.3401-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.s390x" }, "product_reference": "perl-Time-Piece-0:1.3401-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Time-Piece-0:1.3401-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.x86_64" }, "product_reference": "perl-Time-Piece-0:1.3401-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.aarch64" }, "product_reference": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.ppc64le" }, "product_reference": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.s390x" }, "product_reference": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.x86_64" }, "product_reference": "perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Unicode-UCD-0:0.78-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-Unicode-UCD-0:0.78-512.1.el10_0.noarch" }, "product_reference": "perl-Unicode-UCD-0:0.78-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-User-pwent-0:1.05-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-User-pwent-0:1.05-512.1.el10_0.noarch" }, "product_reference": "perl-User-pwent-0:1.05-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-autouse-0:1.11-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-autouse-0:1.11-512.1.el10_0.noarch" }, "product_reference": "perl-autouse-0:1.11-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-base-0:2.27-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-base-0:2.27-512.1.el10_0.noarch" }, "product_reference": "perl-base-0:2.27-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-blib-0:1.07-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-blib-0:1.07-512.1.el10_0.noarch" }, "product_reference": "perl-blib-0:1.07-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-debugger-0:1.60-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-debugger-0:1.60-512.1.el10_0.noarch" }, "product_reference": "perl-debugger-0:1.60-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.aarch64" }, "product_reference": "perl-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.ppc64le" }, "product_reference": "perl-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.s390x" }, "product_reference": "perl-debuginfo-4:5.40.2-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-debuginfo-4:5.40.2-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.x86_64" }, "product_reference": "perl-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-debugsource-4:5.40.2-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.aarch64" }, "product_reference": "perl-debugsource-4:5.40.2-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-debugsource-4:5.40.2-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.ppc64le" }, "product_reference": "perl-debugsource-4:5.40.2-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-debugsource-4:5.40.2-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.s390x" }, "product_reference": "perl-debugsource-4:5.40.2-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-debugsource-4:5.40.2-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.x86_64" }, "product_reference": "perl-debugsource-4:5.40.2-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-deprecate-0:0.04-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-deprecate-0:0.04-512.1.el10_0.noarch" }, "product_reference": "perl-deprecate-0:0.04-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-devel-4:5.40.2-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.aarch64" }, "product_reference": "perl-devel-4:5.40.2-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-devel-4:5.40.2-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.ppc64le" }, "product_reference": "perl-devel-4:5.40.2-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-devel-4:5.40.2-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.s390x" }, "product_reference": "perl-devel-4:5.40.2-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-devel-4:5.40.2-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.x86_64" }, "product_reference": "perl-devel-4:5.40.2-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-diagnostics-0:1.40-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-diagnostics-0:1.40-512.1.el10_0.noarch" }, "product_reference": "perl-diagnostics-0:1.40-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-doc-0:5.40.2-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-doc-0:5.40.2-512.1.el10_0.noarch" }, "product_reference": "perl-doc-0:5.40.2-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-encoding-warnings-0:0.14-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-encoding-warnings-0:0.14-512.1.el10_0.noarch" }, "product_reference": "perl-encoding-warnings-0:0.14-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-fields-0:2.27-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-fields-0:2.27-512.1.el10_0.noarch" }, "product_reference": "perl-fields-0:2.27-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-filetest-0:1.03-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-filetest-0:1.03-512.1.el10_0.noarch" }, "product_reference": "perl-filetest-0:1.03-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-if-0:0.61.000-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-if-0:0.61.000-512.1.el10_0.noarch" }, "product_reference": "perl-if-0:0.61.000-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-interpreter-4:5.40.2-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.aarch64" }, "product_reference": "perl-interpreter-4:5.40.2-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-interpreter-4:5.40.2-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.ppc64le" }, "product_reference": "perl-interpreter-4:5.40.2-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-interpreter-4:5.40.2-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.s390x" }, "product_reference": "perl-interpreter-4:5.40.2-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-interpreter-4:5.40.2-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.x86_64" }, "product_reference": "perl-interpreter-4:5.40.2-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.aarch64" }, "product_reference": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.ppc64le" }, "product_reference": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.s390x" }, "product_reference": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.x86_64" }, "product_reference": "perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-less-0:0.03-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-less-0:0.03-512.1.el10_0.noarch" }, "product_reference": "perl-less-0:0.03-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-lib-0:0.65-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.aarch64" }, "product_reference": "perl-lib-0:0.65-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-lib-0:0.65-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.ppc64le" }, "product_reference": "perl-lib-0:0.65-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-lib-0:0.65-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.s390x" }, "product_reference": "perl-lib-0:0.65-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-lib-0:0.65-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.x86_64" }, "product_reference": "perl-lib-0:0.65-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-libnetcfg-4:5.40.2-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-libnetcfg-4:5.40.2-512.1.el10_0.noarch" }, "product_reference": "perl-libnetcfg-4:5.40.2-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-libs-4:5.40.2-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.aarch64" }, "product_reference": "perl-libs-4:5.40.2-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-libs-4:5.40.2-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.ppc64le" }, "product_reference": "perl-libs-4:5.40.2-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-libs-4:5.40.2-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.s390x" }, "product_reference": "perl-libs-4:5.40.2-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-libs-4:5.40.2-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.x86_64" }, "product_reference": "perl-libs-4:5.40.2-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.aarch64" }, "product_reference": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.ppc64le" }, "product_reference": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.s390x" }, "product_reference": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.x86_64" }, "product_reference": "perl-libs-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-locale-0:1.12-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-locale-0:1.12-512.1.el10_0.noarch" }, "product_reference": "perl-locale-0:1.12-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-macros-4:5.40.2-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-macros-4:5.40.2-512.1.el10_0.noarch" }, "product_reference": "perl-macros-4:5.40.2-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-meta-notation-0:5.40.2-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-meta-notation-0:5.40.2-512.1.el10_0.noarch" }, "product_reference": "perl-meta-notation-0:5.40.2-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-mro-0:1.29-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.aarch64" }, "product_reference": "perl-mro-0:1.29-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-mro-0:1.29-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.ppc64le" }, "product_reference": "perl-mro-0:1.29-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-mro-0:1.29-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.s390x" }, "product_reference": "perl-mro-0:1.29-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-mro-0:1.29-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.x86_64" }, "product_reference": "perl-mro-0:1.29-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.aarch64" }, "product_reference": "perl-mro-debuginfo-0:1.29-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.ppc64le" }, "product_reference": "perl-mro-debuginfo-0:1.29-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.s390x" }, "product_reference": "perl-mro-debuginfo-0:1.29-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-mro-debuginfo-0:1.29-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.x86_64" }, "product_reference": "perl-mro-debuginfo-0:1.29-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-open-0:1.13-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-open-0:1.13-512.1.el10_0.noarch" }, "product_reference": "perl-open-0:1.13-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-overload-0:1.37-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-overload-0:1.37-512.1.el10_0.noarch" }, "product_reference": "perl-overload-0:1.37-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-overloading-0:0.02-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-overloading-0:0.02-512.1.el10_0.noarch" }, "product_reference": "perl-overloading-0:0.02-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ph-0:5.40.2-512.1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.aarch64" }, "product_reference": "perl-ph-0:5.40.2-512.1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ph-0:5.40.2-512.1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.ppc64le" }, "product_reference": "perl-ph-0:5.40.2-512.1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ph-0:5.40.2-512.1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.s390x" }, "product_reference": "perl-ph-0:5.40.2-512.1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-ph-0:5.40.2-512.1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.x86_64" }, "product_reference": "perl-ph-0:5.40.2-512.1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-sigtrap-0:1.10-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-sigtrap-0:1.10-512.1.el10_0.noarch" }, "product_reference": "perl-sigtrap-0:1.10-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-sort-0:2.05-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-sort-0:2.05-512.1.el10_0.noarch" }, "product_reference": "perl-sort-0:2.05-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-subs-0:1.04-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-subs-0:1.04-512.1.el10_0.noarch" }, "product_reference": "perl-subs-0:1.04-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-utils-0:5.40.2-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-utils-0:5.40.2-512.1.el10_0.noarch" }, "product_reference": "perl-utils-0:5.40.2-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-vars-0:1.05-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-vars-0:1.05-512.1.el10_0.noarch" }, "product_reference": "perl-vars-0:1.05-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perl-vmsish-0:1.04-512.1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:perl-vmsish-0:1.04-512.1.el10_0.noarch" }, "product_reference": "perl-vmsish-0:1.04-512.1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56406", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-04-13T14:00:42.440614+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2359290" } ], "notes": [ { "category": "description", "text": "A flaw was found in Perl. This vulnerability allows a heap buffer overflow, which can lead to denial of service and potential arbitrary code execution on platforms that lack sufficient defenses via specially crafted input to the tr/// transliteration operator containing non-ASCII bytes on the left-hand side.", "title": "Vulnerability description" }, { "category": "summary", "text": "perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as an Important vulnerability because a heap buffer overflow vulnerability exists in the tr/// operator causing DoS and arbitrary code execution, which can disrupt system services, background system jobs.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.src", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Attribute-Handlers-0:1.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-AutoLoader-0:5.74-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-AutoSplit-0:5.74-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Benchmark-0:1.25-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Class-Struct-0:0.68-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Config-Extensions-0:0.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-DBM_Filter-0:0.06-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Devel-SelfStubber-0:1.06-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-DirHandle-0:1.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Dumpvalue-0:2.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-English-0:1.11-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-ExtUtils-Constant-0:0.25-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ExtUtils-Embed-0:1.35-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ExtUtils-Miniperl-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-File-Basename-0:2.86-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-Compare-0:1.100.800-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-Copy-0:2.41-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-File-Find-0:1.44-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-stat-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-FileCache-0:1.10-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-FileHandle-0:2.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-FindBin-0:1.54-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Getopt-Std-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-I18N-Collate-0:1.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-I18N-LangTags-0:0.45-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-IPC-Open3-0:1.22-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Locale-Maketext-Simple-1:0.21-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Math-Complex-0:1.62-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Memoize-0:1.16-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Module-Loaded-1:0.08-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-NEXT-0:0.69-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Net-0:1.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Pod-Functions-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Pod-Html-0:1.35-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Safe-0:2.46-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Search-Dict-0:1.07-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-SelectSaver-0:1.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-SelfLoader-0:1.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Symbol-0:1.09-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Term-Complete-0:1.403-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Term-ReadLine-0:1.17-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Test-0:1.31-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Text-Abbrev-0:1.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Thread-0:3.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Thread-Semaphore-0:2.13-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Tie-0:4.6-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Tie-File-0:1.09-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Tie-Memoize-0:1.1-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Time-0:1.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Unicode-UCD-0:0.78-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-User-pwent-0:1.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-autouse-0:1.11-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-base-0:2.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-blib-0:1.07-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-debugger-0:1.60-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-deprecate-0:0.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-diagnostics-0:1.40-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-doc-0:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-encoding-warnings-0:0.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-fields-0:2.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-filetest-0:1.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-if-0:0.61.000-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-less-0:0.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-libnetcfg-4:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-locale-0:1.12-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-macros-4:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-meta-notation-0:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-open-0:1.13-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-overload-0:1.37-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-overloading-0:0.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-sigtrap-0:1.10-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-sort-0:2.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-subs-0:1.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-utils-0:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-vars-0:1.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-vmsish-0:1.04-512.1.el10_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56406" }, { "category": "external", "summary": "RHBZ#2359290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359290" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56406" }, { "category": "external", "summary": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch", "url": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch" }, { "category": "external", "summary": "https://metacpan.org/release/SHAY/perl-5.38.4/changes", "url": "https://metacpan.org/release/SHAY/perl-5.38.4/changes" }, { "category": "external", "summary": "https://metacpan.org/release/SHAY/perl-5.40.2/changes", "url": "https://metacpan.org/release/SHAY/perl-5.40.2/changes" } ], "release_date": "2025-04-13T13:16:09.841000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T16:01:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.src", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Attribute-Handlers-0:1.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-AutoLoader-0:5.74-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-AutoSplit-0:5.74-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Benchmark-0:1.25-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Class-Struct-0:0.68-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Config-Extensions-0:0.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-DBM_Filter-0:0.06-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Devel-SelfStubber-0:1.06-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-DirHandle-0:1.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Dumpvalue-0:2.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-English-0:1.11-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-ExtUtils-Constant-0:0.25-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ExtUtils-Embed-0:1.35-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ExtUtils-Miniperl-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-File-Basename-0:2.86-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-Compare-0:1.100.800-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-Copy-0:2.41-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-File-Find-0:1.44-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-stat-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-FileCache-0:1.10-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-FileHandle-0:2.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-FindBin-0:1.54-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Getopt-Std-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-I18N-Collate-0:1.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-I18N-LangTags-0:0.45-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-IPC-Open3-0:1.22-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Locale-Maketext-Simple-1:0.21-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Math-Complex-0:1.62-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Memoize-0:1.16-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Module-Loaded-1:0.08-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-NEXT-0:0.69-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Net-0:1.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Pod-Functions-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Pod-Html-0:1.35-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Safe-0:2.46-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Search-Dict-0:1.07-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-SelectSaver-0:1.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-SelfLoader-0:1.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Symbol-0:1.09-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Term-Complete-0:1.403-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Term-ReadLine-0:1.17-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Test-0:1.31-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Text-Abbrev-0:1.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Thread-0:3.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Thread-Semaphore-0:2.13-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Tie-0:4.6-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Tie-File-0:1.09-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Tie-Memoize-0:1.1-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Time-0:1.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Unicode-UCD-0:0.78-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-User-pwent-0:1.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-autouse-0:1.11-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-base-0:2.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-blib-0:1.07-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-debugger-0:1.60-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-deprecate-0:0.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-diagnostics-0:1.40-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-doc-0:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-encoding-warnings-0:0.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-fields-0:2.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-filetest-0:1.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-if-0:0.61.000-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-less-0:0.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-libnetcfg-4:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-locale-0:1.12-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-macros-4:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-meta-notation-0:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-open-0:1.13-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-overload-0:1.37-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-overloading-0:0.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-sigtrap-0:1.10-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-sort-0:2.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-subs-0:1.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-utils-0:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-vars-0:1.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-vmsish-0:1.04-512.1.el10_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7500" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.src", "AppStream-10.0.Z:perl-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Attribute-Handlers-0:1.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-AutoLoader-0:5.74-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-AutoSplit-0:5.74-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-B-0:1.89-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Benchmark-0:1.25-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Class-Struct-0:0.68-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Config-Extensions-0:0.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-DBM_Filter-0:0.06-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Devel-SelfStubber-0:1.06-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-DirHandle-0:1.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Dumpvalue-0:2.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-English-0:1.11-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Errno-0:1.38-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-ExtUtils-Constant-0:0.25-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ExtUtils-Embed-0:1.35-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ExtUtils-Miniperl-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-File-Basename-0:2.86-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-Compare-0:1.100.800-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-Copy-0:2.41-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-File-Find-0:1.44-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-File-stat-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-FileCache-0:1.10-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-FileHandle-0:2.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-FindBin-0:1.54-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Getopt-Std-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-I18N-Collate-0:1.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-I18N-LangTags-0:0.45-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-IO-0:1.55-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-IPC-Open3-0:1.22-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Locale-Maketext-Simple-1:0.21-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Math-Complex-0:1.62-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Memoize-0:1.16-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Module-Loaded-1:0.08-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-NEXT-0:0.69-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Net-0:1.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Opcode-0:1.65-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-POSIX-0:2.20-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Pod-Functions-0:1.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Pod-Html-0:1.35-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Safe-0:2.46-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Search-Dict-0:1.07-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-SelectSaver-0:1.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-SelfLoader-0:1.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Symbol-0:1.09-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Term-Complete-0:1.403-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Term-ReadLine-0:1.17-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Test-0:1.31-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Text-Abbrev-0:1.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Thread-0:3.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Thread-Semaphore-0:2.13-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Tie-0:4.6-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Tie-File-0:1.09-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Tie-Memoize-0:1.1-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Time-0:1.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-Unicode-UCD-0:0.78-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-User-pwent-0:1.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-autouse-0:1.11-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-base-0:2.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-blib-0:1.07-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-debugger-0:1.60-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-deprecate-0:0.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-devel-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-diagnostics-0:1.40-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-doc-0:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-encoding-warnings-0:0.14-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-fields-0:2.27-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-filetest-0:1.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-if-0:0.61.000-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-less-0:0.03-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-lib-0:0.65-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-libnetcfg-4:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-libs-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-locale-0:1.12-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-macros-4:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-meta-notation-0:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-mro-0:1.29-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-open-0:1.13-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-overload-0:1.37-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-overloading-0:0.02-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.aarch64", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.ppc64le", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.s390x", "AppStream-10.0.Z:perl-ph-0:5.40.2-512.1.el10_0.x86_64", "AppStream-10.0.Z:perl-sigtrap-0:1.10-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-sort-0:2.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-subs-0:1.04-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-utils-0:5.40.2-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-vars-0:1.05-512.1.el10_0.noarch", "AppStream-10.0.Z:perl-vmsish-0:1.04-512.1.el10_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes" } ] }
opensuse-su-2025:15003-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "perl-32bit-5.40.2-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the perl-32bit-5.40.2-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15003", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15003-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:15003-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMWNA2ZAVCKGDBHY24AR252NG47ECKHT/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:15003-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMWNA2ZAVCKGDBHY24AR252NG47ECKHT/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56406 page", "url": "https://www.suse.com/security/cve/CVE-2024-56406/" } ], "title": "perl-32bit-5.40.2-1.1 on GA media", "tracking": { "current_release_date": "2025-04-16T00:00:00Z", "generator": { "date": "2025-04-16T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15003-1", "initial_release_date": "2025-04-16T00:00:00Z", "revision_history": [ { "date": "2025-04-16T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "perl-5.40.2-1.1.aarch64", "product": { "name": "perl-5.40.2-1.1.aarch64", "product_id": "perl-5.40.2-1.1.aarch64" } }, { "category": "product_version", "name": "perl-32bit-5.40.2-1.1.aarch64", "product": { "name": "perl-32bit-5.40.2-1.1.aarch64", "product_id": "perl-32bit-5.40.2-1.1.aarch64" } }, { "category": "product_version", "name": "perl-base-5.40.2-1.1.aarch64", "product": { "name": "perl-base-5.40.2-1.1.aarch64", "product_id": "perl-base-5.40.2-1.1.aarch64" } }, { "category": "product_version", "name": "perl-base-32bit-5.40.2-1.1.aarch64", "product": { "name": "perl-base-32bit-5.40.2-1.1.aarch64", "product_id": "perl-base-32bit-5.40.2-1.1.aarch64" } }, { "category": "product_version", "name": "perl-doc-5.40.2-1.1.aarch64", "product": { "name": "perl-doc-5.40.2-1.1.aarch64", "product_id": "perl-doc-5.40.2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "perl-5.40.2-1.1.ppc64le", "product": { "name": "perl-5.40.2-1.1.ppc64le", "product_id": "perl-5.40.2-1.1.ppc64le" } }, { "category": "product_version", "name": "perl-32bit-5.40.2-1.1.ppc64le", "product": { "name": "perl-32bit-5.40.2-1.1.ppc64le", "product_id": "perl-32bit-5.40.2-1.1.ppc64le" } }, { "category": "product_version", "name": "perl-base-5.40.2-1.1.ppc64le", "product": { "name": "perl-base-5.40.2-1.1.ppc64le", "product_id": "perl-base-5.40.2-1.1.ppc64le" } }, { "category": "product_version", "name": "perl-base-32bit-5.40.2-1.1.ppc64le", "product": { "name": "perl-base-32bit-5.40.2-1.1.ppc64le", "product_id": "perl-base-32bit-5.40.2-1.1.ppc64le" } }, { "category": "product_version", "name": "perl-doc-5.40.2-1.1.ppc64le", "product": { "name": "perl-doc-5.40.2-1.1.ppc64le", "product_id": "perl-doc-5.40.2-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "perl-5.40.2-1.1.s390x", "product": { "name": "perl-5.40.2-1.1.s390x", "product_id": "perl-5.40.2-1.1.s390x" } }, { "category": "product_version", "name": "perl-32bit-5.40.2-1.1.s390x", "product": { "name": "perl-32bit-5.40.2-1.1.s390x", "product_id": "perl-32bit-5.40.2-1.1.s390x" } }, { "category": "product_version", "name": "perl-base-5.40.2-1.1.s390x", "product": { "name": "perl-base-5.40.2-1.1.s390x", "product_id": "perl-base-5.40.2-1.1.s390x" } }, { "category": "product_version", "name": "perl-base-32bit-5.40.2-1.1.s390x", "product": { "name": "perl-base-32bit-5.40.2-1.1.s390x", "product_id": "perl-base-32bit-5.40.2-1.1.s390x" } }, { "category": "product_version", "name": "perl-doc-5.40.2-1.1.s390x", "product": { "name": "perl-doc-5.40.2-1.1.s390x", "product_id": "perl-doc-5.40.2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "perl-5.40.2-1.1.x86_64", "product": { "name": "perl-5.40.2-1.1.x86_64", "product_id": "perl-5.40.2-1.1.x86_64" } }, { "category": "product_version", "name": "perl-32bit-5.40.2-1.1.x86_64", "product": { "name": "perl-32bit-5.40.2-1.1.x86_64", "product_id": "perl-32bit-5.40.2-1.1.x86_64" } }, { "category": "product_version", "name": "perl-base-5.40.2-1.1.x86_64", "product": { "name": "perl-base-5.40.2-1.1.x86_64", "product_id": "perl-base-5.40.2-1.1.x86_64" } }, { "category": "product_version", "name": "perl-base-32bit-5.40.2-1.1.x86_64", "product": { "name": "perl-base-32bit-5.40.2-1.1.x86_64", "product_id": "perl-base-32bit-5.40.2-1.1.x86_64" } }, { "category": "product_version", "name": "perl-doc-5.40.2-1.1.x86_64", "product": { "name": "perl-doc-5.40.2-1.1.x86_64", "product_id": "perl-doc-5.40.2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "perl-5.40.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-5.40.2-1.1.aarch64" }, "product_reference": "perl-5.40.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-5.40.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-5.40.2-1.1.ppc64le" }, "product_reference": "perl-5.40.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-5.40.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-5.40.2-1.1.s390x" }, "product_reference": "perl-5.40.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-5.40.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-5.40.2-1.1.x86_64" }, "product_reference": "perl-5.40.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-32bit-5.40.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.aarch64" }, "product_reference": "perl-32bit-5.40.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-32bit-5.40.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.ppc64le" }, "product_reference": "perl-32bit-5.40.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-32bit-5.40.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.s390x" }, "product_reference": "perl-32bit-5.40.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-32bit-5.40.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.x86_64" }, "product_reference": "perl-32bit-5.40.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-base-5.40.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-base-5.40.2-1.1.aarch64" }, "product_reference": "perl-base-5.40.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-base-5.40.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-base-5.40.2-1.1.ppc64le" }, "product_reference": "perl-base-5.40.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-base-5.40.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-base-5.40.2-1.1.s390x" }, "product_reference": "perl-base-5.40.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-base-5.40.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-base-5.40.2-1.1.x86_64" }, "product_reference": "perl-base-5.40.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-base-32bit-5.40.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.aarch64" }, "product_reference": "perl-base-32bit-5.40.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-base-32bit-5.40.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.ppc64le" }, "product_reference": "perl-base-32bit-5.40.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-base-32bit-5.40.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.s390x" }, "product_reference": "perl-base-32bit-5.40.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-base-32bit-5.40.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.x86_64" }, "product_reference": "perl-base-32bit-5.40.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-doc-5.40.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.aarch64" }, "product_reference": "perl-doc-5.40.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-doc-5.40.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.ppc64le" }, "product_reference": "perl-doc-5.40.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-doc-5.40.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.s390x" }, "product_reference": "perl-doc-5.40.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-doc-5.40.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.x86_64" }, "product_reference": "perl-doc-5.40.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56406" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow vulnerability was discovered in Perl. \n\nRelease branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.\n\nWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\n\n $ perl -e \u0027$_ = \"\\x{FF}\" x 1000000; tr/\\xFF/\\x{100}/;\u0027 \n Segmentation fault (core dumped)\n\nIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56406", "url": "https://www.suse.com/security/cve/CVE-2024-56406" }, { "category": "external", "summary": "SUSE Bug 1241083 for CVE-2024-56406", "url": "https://bugzilla.suse.com/1241083" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-32bit-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-base-32bit-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-base-5.40.2-1.1.x86_64", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.aarch64", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.ppc64le", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.s390x", "openSUSE Tumbleweed:perl-doc-5.40.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-04-16T00:00:00Z", "details": "important" } ], "title": "CVE-2024-56406" } ] }
fkie_cve-2024-56406
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
9b29abf9-4ab0-4765-b253-1875cd9b441e | https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch | Patch | |
9b29abf9-4ab0-4765-b253-1875cd9b441e | https://metacpan.org/release/SHAY/perl-5.38.4/changes | Release Notes | |
9b29abf9-4ab0-4765-b253-1875cd9b441e | https://metacpan.org/release/SHAY/perl-5.40.2/changes | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/04/13/3 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/04/13/4 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/04/13/5 | Mailing List |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F34096A4-1439-4582-8133-8134388418D1", "versionEndExcluding": "5.38.4", "versionStartIncluding": "5.33.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "matchCriteriaId": "91EF91EF-222F-42C0-A506-0A57B98F1DA5", "versionEndExcluding": "5.40.2", "versionStartIncluding": "5.39.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "matchCriteriaId": "87807B8D-271E-4B95-ADBC-2383FBD07335", "versionEndIncluding": "5.41.10", "versionStartIncluding": "5.41.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap buffer overflow vulnerability was discovered in Perl. \n\nRelease branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.\n\nWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\n\n\u00a0 \u00a0$ perl -e \u0027$_ = \"\\x{FF}\" x 1000000; tr/\\xFF/\\x{100}/;\u0027 \n\u00a0 \u00a0Segmentation fault (core dumped)\n\nIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses." }, { "lang": "es", "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer de mont\u00f3n en Perl. Las versiones 5.34, 5.36, 5.38 y 5.40 se ven afectadas, incluyendo las versiones de desarrollo de la 5.33.1 a la 5.41.10. Cuando hay bytes no ASCII en el lado izquierdo del operador `tr`, `S_do_trans_invmap` puede desbordar el puntero de destino `d`. $ perl -e \u0027$_ = \"\\x{FF}\" x 1000000; tr/\\xFF/\\x{100}/;\u0027 Fallo de segmentaci\u00f3n (volcado de n\u00facleo). Se cree que esta vulnerabilidad puede permitir ataques de denegaci\u00f3n de servicio y, posiblemente, de ejecuci\u00f3n de c\u00f3digo en plataformas que carecen de defensas suficientes." } ], "id": "CVE-2024-56406", "lastModified": "2025-10-16T14:15:34.083", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-04-13T14:15:14.527", "references": [ { "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "tags": [ "Patch" ], "url": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch" }, { "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "tags": [ "Release Notes" ], "url": "https://metacpan.org/release/SHAY/perl-5.38.4/changes" }, { "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "tags": [ "Release Notes" ], "url": "https://metacpan.org/release/SHAY/perl-5.40.2/changes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2025/04/13/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2025/04/13/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2025/04/13/5" } ], "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" }, { "lang": "en", "value": "CWE-787" } ], "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.