Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-57699 (GCVE-0-2024-57699)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-57699",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-06T15:14:00.482073Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-674",
"description": "CWE-674 Uncontrolled Recursion",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-06T15:15:17.536Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of \u2019{\u2019, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T21:38:33.811Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
},
{
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-57699",
"datePublished": "2025-02-05T00:00:00.000Z",
"dateReserved": "2025-01-09T00:00:00.000Z",
"dateUpdated": "2025-02-06T15:15:17.536Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-57699\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-02-05T22:15:33.183\",\"lastModified\":\"2025-02-06T16:15:41.170\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of \u2019{\u2019, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un problema de seguridad en Netplex Json-smart 2.5.0 a 2.5.1. Al cargar una entrada JSON manipulado especial, que contiene una gran cantidad de \u2019{\u2019, se puede activar un agotamiento de la pila, lo que podr\u00eda permitir que un atacante provoque una denegaci\u00f3n de servicio (DoS). Este problema existe debido a una correcci\u00f3n incompleta de CVE-2023-1370.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-674\"}]}],\"references\":[{\"url\":\"https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://nvd.nist.gov/vuln/detail/cve-2023-1370\",\"source\":\"cve@mitre.org\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-57699\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-06T15:14:00.482073Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-674\", \"description\": \"CWE-674 Uncontrolled Recursion\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-06T15:14:58.541Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://nvd.nist.gov/vuln/detail/cve-2023-1370\"}, {\"url\": \"https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of \\u2019{\\u2019, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-02-05T21:38:33.811Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-57699\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-06T15:15:17.536Z\", \"dateReserved\": \"2025-01-09T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2025-02-05T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
rhsa-2025:10098
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.16. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not enforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10098",
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10098.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.16 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:29+00:00",
"generator": {
"date": "2025-11-11T16:21:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10098",
"initial_release_date": "2025-07-01T14:34:48+00:00",
"revision_history": [
{
"date": "2025-07-01T14:34:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:34:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.16",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.16::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750857144-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.16.1750857315-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750857144-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.16.1750857315-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750857144-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10118
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP\nTools 4.12. Red Hat Product Security has rated this update as having a\nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10118",
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10118.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:30+00:00",
"generator": {
"date": "2025-11-11T16:21:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10118",
"initial_release_date": "2025-07-01T16:36:58+00:00",
"revision_history": [
{
"date": "2025-07-01T16:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.12",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750932984-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.12.1750933270-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750932984-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.12.1750933270-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750932984-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:3543
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat build of Apache Camel 4.8.5 for Spring Boot release and security update is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat build of Apache Camel 4.8.5 for Spring Boot release and security update is now available.\n\nThe purpose of this text-only errata is to inform you about the security issues fixed.\n\nSecurity Fix(es):\n\n* json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) (CVE-2024-57699)\n\n* io.smallrye/smallrye-fault-tolerance-core: SmallRye Fault Tolerance (CVE-2025-2240)\n\n* spring-security-core: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not enforce maximum password length (CVE-2025-22228)\n\n* io.netty/netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine (CVE-2025-24970)\n\n* org.apache.camel/camel-http: bypass of header filters via specially crafted response (CVE-2025-27636)\n\n* org.apache.camel/camel-http-base: bypass of header filters via specially crafted response (CVE-2025-27636)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:3543",
"url": "https://access.redhat.com/errata/RHSA-2025:3543"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "2350682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350682"
},
{
"category": "external",
"summary": "2351452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351452"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3543.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8.5 for Spring Boot security update.",
"tracking": {
"current_release_date": "2025-11-11T16:17:58+00:00",
"generator": {
"date": "2025-11-11T16:17:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:3543",
"initial_release_date": "2025-04-02T20:19:22+00:00",
"revision_history": [
{
"date": "2025-04-02T20:19:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-04-02T20:19:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:17:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat build of Apache Camel 4.8.5 for Spring Boot",
"product": {
"name": "Red Hat build of Apache Camel 4.8.5 for Spring Boot",
"product_id": "Red Hat build of Apache Camel 4.8.5 for Spring Boot",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:apache_camel_spring_boot:4.8.5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Build of Apache Camel"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T20:19:22+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3543"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-2240",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2025-03-12T02:23:44.660000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2351452"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Smallrye, where smallrye-fault-tolerance is vulnerable to an out-of-memory (OOM) issue. This vulnerability is externally triggered when calling the metrics URI. Every call creates a new object within meterMap and may lead to a denial of service (DoS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "smallrye-fault-tolerance: SmallRye Fault Tolerance",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability allows a remote attacker to cause an out-of-memory issue when calling the metrics URI, resulting in a denial of service. As this flaw can be triggered via the network, it has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-2240"
},
{
"category": "external",
"summary": "RHBZ#2351452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351452"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-2240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2240"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-2240",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2240"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-gfh6-3pqw-x2j4",
"url": "https://github.com/advisories/GHSA-gfh6-3pqw-x2j4"
}
],
"release_date": "2025-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T20:19:22+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3543"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "smallrye-fault-tolerance: SmallRye Fault Tolerance"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T20:19:22+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3543"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-02-10T23:00:52.785132+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344787"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Netty\u0027s SslHandler is of important severity rather than moderate because it directly impacts the stability and reliability of applications using native SSLEngine. By sending a specially crafted packet, an attacker can trigger a native crash, leading to a complete process termination. Unlike typical moderate vulnerabilities that might cause limited disruptions or require specific conditions, this flaw can be exploited remotely to induce a Denial of Service (DoS), affecting high-availability systems and mission-critical services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24970"
},
{
"category": "external",
"summary": "RHBZ#2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4",
"url": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw",
"url": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw"
}
],
"release_date": "2025-02-10T21:57:28.730000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T20:19:22+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3543"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine"
},
{
"cve": "CVE-2025-27636",
"cwe": {
"id": "CWE-644",
"name": "Improper Neutralization of HTTP Headers for Scripting Syntax"
},
"discovery_date": "2025-03-07T18:53:28.136000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2350682"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Apache Camel. This flaw allows an attacker to bypass filtering via a specially crafted request containing a certain combination of upper and lower case characters due to an issue in the default header filtering mechanism, which blocks headers starting with \"Camel\" or \"camel.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "camel-http: org.apache.camel: bypass of header filters via specially crafted response",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as having Moderate impact because it can only be triggered under certain configurations and does not enable complete takeover of the system. In order to be vulnerable, a system using the Apache Camel Framework must specifically be using the camel-bean component as a producer and the exchange is coming from a http-based consumer, such as HTTP component or platform-http. If exploitation occurs, an attacker could call other methods on that bean already in the classpath, but not from other arbitrary java beans, System.getenv, nor part of JDK itself.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27636"
},
{
"category": "external",
"summary": "RHBZ#2350682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350682"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27636",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27636"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27636",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27636"
},
{
"category": "external",
"summary": "https://github.com/apache/camel/commit/781491b446921341f87a13824be4f7b5063776fc",
"url": "https://github.com/apache/camel/commit/781491b446921341f87a13824be4f7b5063776fc"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/l3zcg3vts88bmc7w8172wkgw610y693z",
"url": "https://lists.apache.org/thread/l3zcg3vts88bmc7w8172wkgw610y693z"
}
],
"release_date": "2025-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T20:19:22+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3543"
},
{
"category": "workaround",
"details": "Remove headers from your Camel routes; this can be accomplished in several ways, including globally or per route.",
"product_ids": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat build of Apache Camel 4.8.5 for Spring Boot"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "camel-http: org.apache.camel: bypass of header filters via specially crafted response"
}
]
}
rhsa-2025:10097
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.17. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10097",
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10097.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.17 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:28+00:00",
"generator": {
"date": "2025-11-11T16:21:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10097",
"initial_release_date": "2025-07-01T14:30:33+00:00",
"revision_history": [
{
"date": "2025-07-01T14:30:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:30:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.17",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.17::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750851690-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.17.1750851950-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750851690-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.17.1750851950-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750851690-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10104
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.15. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10104",
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10104.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:30+00:00",
"generator": {
"date": "2025-11-11T16:21:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10104",
"initial_release_date": "2025-07-01T14:56:03+00:00",
"revision_history": [
{
"date": "2025-07-01T14:56:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:56:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.15",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.15::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750856366-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.15.1750856638-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750856366-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.15.1750856638-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750856366-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10092
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat Product OCP \nTools 4.18. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10092",
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10092.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.18 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:28+00:00",
"generator": {
"date": "2025-11-11T16:21:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10092",
"initial_release_date": "2025-07-01T13:48:03+00:00",
"revision_history": [
{
"date": "2025-07-01T13:48:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T13:48:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.18",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.18::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750846524-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.18.1750846854-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750846524-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.18.1750846854-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750846524-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:3541
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.4.GA).\nThe purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products.\nRed Hat Product Security has rated this update as having a security impact of Important.",
"title": "Topic"
},
{
"category": "general",
"text": "An update for Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.4.GA).\nThe purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products:\n* quarkus-camel-bom: Potential DoS via stack exhaustion (CVE-2024-57699)\n* com.redhat.quarkus.platform/quarkus-cxf-bom: SmallRye Fault Tolerance (CVE-2025-2240)\n* com.redhat.quarkus.platform/quarkus-camel-bom: SmallRye Fault Tolerance (CVE-2025-2240)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:3541",
"url": "https://access.redhat.com/errata/RHSA-2025:3541"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-57699",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-2240",
"url": "https://access.redhat.com/security/cve/CVE-2025-2240"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2351452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351452"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3541.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.4.GA)",
"tracking": {
"current_release_date": "2025-11-11T16:21:31+00:00",
"generator": {
"date": "2025-11-11T16:21:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:3541",
"initial_release_date": "2025-04-02T16:48:42+00:00",
"revision_history": [
{
"date": "2025-04-02T16:48:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-04-02T16:48:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Build of Apache Camel 4.8 for Quarkus 3.15",
"product": {
"name": "Red Hat Build of Apache Camel 4.8 for Quarkus 3.15",
"product_id": "Red Hat Build of Apache Camel 4.8 for Quarkus 3.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:camel_quarkus:3.15"
}
}
}
],
"category": "product_family",
"name": "Red Hat Build of Apache Camel"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T16:48:42+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3541"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-2240",
"cwe": {
"id": "CWE-1325",
"name": "Improperly Controlled Sequential Memory Allocation"
},
"discovery_date": "2025-03-12T02:23:44.660000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2351452"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Smallrye, where smallrye-fault-tolerance is vulnerable to an out-of-memory (OOM) issue. This vulnerability is externally triggered when calling the metrics URI. Every call creates a new object within meterMap and may lead to a denial of service (DoS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "smallrye-fault-tolerance: SmallRye Fault Tolerance",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability allows a remote attacker to cause an out-of-memory issue when calling the metrics URI, resulting in a denial of service. As this flaw can be triggered via the network, it has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-2240"
},
{
"category": "external",
"summary": "RHBZ#2351452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351452"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-2240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2240"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-2240",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2240"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-gfh6-3pqw-x2j4",
"url": "https://github.com/advisories/GHSA-gfh6-3pqw-x2j4"
}
],
"release_date": "2025-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-02T16:48:42+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3541"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Build of Apache Camel 4.8 for Quarkus 3.15"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "smallrye-fault-tolerance: SmallRye Fault Tolerance"
}
]
}
rhsa-2025:10120
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.14. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10120",
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10120.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:31+00:00",
"generator": {
"date": "2025-11-11T16:21:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10120",
"initial_release_date": "2025-07-01T16:53:09+00:00",
"revision_history": [
{
"date": "2025-07-01T16:53:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:53:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.14",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.14::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750903189-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.14.1750903529-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750903189-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.14.1750903529-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750903189-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10119
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat Product OCP \nTools 4.13. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10119",
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10119.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-11-11T16:21:32+00:00",
"generator": {
"date": "2025-11-11T16:21:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10119",
"initial_release_date": "2025-07-01T16:31:24+00:00",
"revision_history": [
{
"date": "2025-07-01T16:31:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:31:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T16:21:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.13",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.13::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750916374-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.13.1750916671-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750916374-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.13.1750916671-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750916374-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:8761
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "HawtIO 4.2.0 for Red Hat build of Apache Camel 4 GA Release is now available.\n\nThe purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "HawtIO 4.2.0 for Red Hat build of Apache Camel 4 GA Release is now available.\n\nThe purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products.\n\n* path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x (CVE-2024-52798);\n\n* io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling (CVE-2024-12397);\n\n* ParsePKCS1PrivateKey panic with partial keys in crypto/x509 (CVE-2025-22866);\n\n* io.netty/netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine (CVE-2025-24970);\n\n* json-smart: Potential DoS via stack exhaustion (CVE-2024-57699).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:8761",
"url": "https://access.redhat.com/errata/RHSA-2025:8761"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2330689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330689"
},
{
"category": "external",
"summary": "2331298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331298"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2344219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219"
},
{
"category": "external",
"summary": "2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_8761.json"
}
],
"title": "Red Hat Security Advisory: HawtIO 4.2.0 for Red Hat build of Apache Camel 4 Release and security update.",
"tracking": {
"current_release_date": "2025-11-11T15:49:11+00:00",
"generator": {
"date": "2025-11-11T15:49:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:8761",
"initial_release_date": "2025-06-10T10:39:32+00:00",
"revision_history": [
{
"date": "2025-06-10T10:39:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-06-10T10:39:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T15:49:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "HawtIO HawtIO 4.2.0",
"product": {
"name": "HawtIO HawtIO 4.2.0",
"product_id": "HawtIO HawtIO 4.2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:apache_camel_hawtio:4.2::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Build of Apache Camel"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12397",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2024-12-10T01:15:33.380000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Quarkus-HTTP, which incorrectly parses cookies with\ncertain value-delimiting characters in incoming requests. This issue could\nallow an attacker to construct a cookie value to exfiltrate HttpOnly cookie\nvalues or spoof arbitrary additional cookie values, leading to unauthorized\ndata access or modification. The main threat from this flaw impacts data\nconfidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has evaluated this vulnerability. This is a very similar vulnerability to an Undertow, seen in CVE-2023-4639.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HawtIO HawtIO 4.2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12397"
},
{
"category": "external",
"summary": "RHBZ#2331298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12397"
}
],
"release_date": "2024-12-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-10T10:39:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HawtIO HawtIO 4.2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:8761"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"HawtIO HawtIO 4.2.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"HawtIO HawtIO 4.2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling"
},
{
"cve": "CVE-2024-52798",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-12-05T23:00:59.020167+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2330689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in path-to-regexp. A path-to-regexp turns path strings into regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability exists because of an incomplete fix for CVE-2024-45296.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HawtIO HawtIO 4.2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-52798"
},
{
"category": "external",
"summary": "RHBZ#2330689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-52798",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52798"
},
{
"category": "external",
"summary": "https://github.com/pillarjs/path-to-regexp/commit/f01c26a013b1889f0c217c643964513acf17f6a4",
"url": "https://github.com/pillarjs/path-to-regexp/commit/f01c26a013b1889f0c217c643964513acf17f6a4"
},
{
"category": "external",
"summary": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w",
"url": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w"
}
],
"release_date": "2024-12-05T22:45:42.774000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-10T10:39:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HawtIO HawtIO 4.2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:8761"
},
{
"category": "workaround",
"details": "Avoid using two parameters within a single path segment when the separator is not, for example, /:a-:b. Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking.",
"product_ids": [
"HawtIO HawtIO 4.2.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"HawtIO HawtIO 4.2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HawtIO HawtIO 4.2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-10T10:39:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HawtIO HawtIO 4.2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:8761"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"HawtIO HawtIO 4.2.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HawtIO HawtIO 4.2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-22866",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-02-06T17:00:56.155646+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344219"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HawtIO HawtIO 4.2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22866"
},
{
"category": "external",
"summary": "RHBZ#2344219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866"
},
{
"category": "external",
"summary": "https://go.dev/cl/643735",
"url": "https://go.dev/cl/643735"
},
{
"category": "external",
"summary": "https://go.dev/issue/71383",
"url": "https://go.dev/issue/71383"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k",
"url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-3447",
"url": "https://pkg.go.dev/vuln/GO-2025-3447"
}
],
"release_date": "2025-02-06T16:54:10.252000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-10T10:39:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HawtIO HawtIO 4.2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:8761"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HawtIO HawtIO 4.2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-02-10T23:00:52.785132+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344787"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Netty\u0027s SslHandler is of important severity rather than moderate because it directly impacts the stability and reliability of applications using native SSLEngine. By sending a specially crafted packet, an attacker can trigger a native crash, leading to a complete process termination. Unlike typical moderate vulnerabilities that might cause limited disruptions or require specific conditions, this flaw can be exploited remotely to induce a Denial of Service (DoS), affecting high-availability systems and mission-critical services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HawtIO HawtIO 4.2.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24970"
},
{
"category": "external",
"summary": "RHBZ#2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4",
"url": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw",
"url": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw"
}
],
"release_date": "2025-02-10T21:57:28.730000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-10T10:39:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HawtIO HawtIO 4.2.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:8761"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"HawtIO HawtIO 4.2.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HawtIO HawtIO 4.2.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine"
}
]
}
ncsc-2025-0124
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Communications producten, waaronder de Cloud Native Core en Policy Management.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in Oracle Communications producten stellen ongeauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en kunnen leiden tot Denial-of-Service (DoS) aanvallen. Specifieke versies van de Cloud Native Core, zoals de Binding Support Function en Network Repository Function, zijn getroffen, met CVSS-scores die vari\u00ebren van 4.3 tot 9.8, wat wijst op significante risico\u0027s voor de beschikbaarheid en vertrouwelijkheid van de systemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "general",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements Used in a Template Engine",
"title": "CWE-1336"
},
{
"category": "general",
"text": "Missing Report of Error Condition",
"title": "CWE-392"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
"title": "CWE-917"
},
{
"category": "general",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2025-04-16T08:39:55.217751Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0124",
"initial_release_date": "2025-04-16T08:39:55.217751Z",
"revision_history": [
{
"date": "2025-04-16T08:39:55.217751Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.1",
"product": {
"name": "vers:unknown/24.2.1",
"product_id": "CSAFPID-1838578"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.2.0",
"product": {
"name": "vers:unknown/24.2.0",
"product_id": "CSAFPID-1838586"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
"product": {
"name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
"product_id": "CSAFPID-1838591"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.1",
"product": {
"name": "vers:unknown/24.2.1",
"product_id": "CSAFPID-1838592"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.0",
"product": {
"name": "vers:unknown/24.2.0",
"product_id": "CSAFPID-1838572"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.2.1",
"product": {
"name": "vers:unknown/24.2.1",
"product_id": "CSAFPID-1838581"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.2.2",
"product": {
"name": "vers:unknown/24.2.2",
"product_id": "CSAFPID-1838584"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=6.0|\u003c=6.1",
"product": {
"name": "vers:unknown/\u003e=6.0|\u003c=6.1",
"product_id": "CSAFPID-2698355"
}
}
],
"category": "product_name",
"name": "Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.3.0",
"product": {
"name": "vers:unknown/24.3.0",
"product_id": "CSAFPID-2698333"
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.0",
"product": {
"name": "vers:unknown/24.2.0",
"product_id": "CSAFPID-2698334"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Network Data Analytics Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.5",
"product": {
"name": "vers:unknown/24.2.5",
"product_id": "CSAFPID-2698374"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.0.0",
"product": {
"name": "vers:unknown/9.0.0",
"product_id": "CSAFPID-1234193"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.0.1",
"product": {
"name": "vers:unknown/9.0.1",
"product_id": "CSAFPID-1234261"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.0.2",
"product": {
"name": "vers:unknown/9.0.2",
"product_id": "CSAFPID-2698362"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.0.3",
"product": {
"name": "vers:unknown/9.0.3",
"product_id": "CSAFPID-2698358"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2698372"
}
}
],
"category": "product_name",
"name": "Communications Element Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/15.0.0.0.0",
"product": {
"name": "vers:unknown/15.0.0.0.0",
"product_id": "CSAFPID-1837923"
}
}
],
"category": "product_name",
"name": "Communications Policy Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2698373"
}
}
],
"category": "product_name",
"name": "Communications Session Report Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.1.1.9",
"product": {
"name": "vers:unknown/9.1.1.9",
"product_id": "CSAFPID-2698357"
}
}
],
"category": "product_name",
"name": "SD-WAN Edge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.3",
"product": {
"name": "vers:unknown/24.2.3",
"product_id": "CSAFPID-1838579"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.3.0",
"product": {
"name": "vers:unknown/24.3.0",
"product_id": "CSAFPID-1838582"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/10.0.0",
"product": {
"name": "vers:unknown/10.0.0",
"product_id": "CSAFPID-2698381"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.2.0",
"product": {
"name": "vers:unknown/9.2.0",
"product_id": "CSAFPID-1207518"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.3.0",
"product": {
"name": "vers:unknown/9.3.0",
"product_id": "CSAFPID-1207704"
}
}
],
"category": "product_name",
"name": "Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/4.1.0",
"product": {
"name": "vers:unknown/4.1.0",
"product_id": "CSAFPID-1207607"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4.2.0",
"product": {
"name": "vers:unknown/4.2.0",
"product_id": "CSAFPID-1207752"
}
}
],
"category": "product_name",
"name": "Enterprise Communications Broker"
}
],
"category": "product_family",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product": {
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product_id": "CSAFPID-2698963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2698973",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.4",
"product": {
"name": "vers:oracle/24.2.4",
"product_id": "CSAFPID-2699085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core DBTier"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product": {
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product_id": "CSAFPID-1839907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
"product": {
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
"product_id": "CSAFPID-2698965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
"product": {
"name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
"product_id": "CSAFPID-2698944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.1-24.2.4:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839952",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-2699038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839951",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-2699059",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-1839919",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2698957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.0",
"product": {
"name": "vers:oracle/23.4.0",
"product_id": "CSAFPID-1839924",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-1839894",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2698958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2699094",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839934",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2699086",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839935",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/25.1.100",
"product": {
"name": "vers:oracle/25.1.100",
"product_id": "CSAFPID-2699073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:25.1.100:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/46.6",
"product": {
"name": "vers:oracle/46.6",
"product_id": "CSAFPID-2698993",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE Element Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/5.1",
"product": {
"name": "vers:oracle/5.1",
"product_id": "CSAFPID-1839893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/5.2",
"product": {
"name": "vers:oracle/5.2",
"product_id": "CSAFPID-1839895",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Operations Monitor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.11",
"product": {
"name": "vers:oracle/12.11",
"product_id": "CSAFPID-1839890",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.0",
"product": {
"name": "vers:oracle/14.0",
"product_id": "CSAFPID-1839891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.0.0",
"product": {
"name": "vers:oracle/14.0.0",
"product_id": "CSAFPID-2699072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0",
"product": {
"name": "vers:oracle/15.0",
"product_id": "CSAFPID-1839961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0",
"product": {
"name": "vers:oracle/15.0.0",
"product_id": "CSAFPID-2699023",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1",
"product": {
"name": "vers:oracle/15.0.1",
"product_id": "CSAFPID-2699025",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.2",
"product": {
"name": "vers:oracle/15.0.2",
"product_id": "CSAFPID-2699024",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications User Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.0.0.0",
"product": {
"name": "vers:oracle/9.0.0.0",
"product_id": "CSAFPID-2698999",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Diameter Signaling Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2698996",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_cloud_engine:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-2699007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Data Analytics Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.5",
"product": {
"name": "vers:oracle/24.2.5",
"product_id": "CSAFPID-2699029",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.0.0",
"product": {
"name": "vers:oracle/9.0.0",
"product_id": "CSAFPID-2699013",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.1",
"product": {
"name": "vers:oracle/9.0.1",
"product_id": "CSAFPID-2699012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.2",
"product": {
"name": "vers:oracle/9.0.2",
"product_id": "CSAFPID-2699016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.3",
"product": {
"name": "vers:oracle/9.0.3",
"product_id": "CSAFPID-2699015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2699098",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Element Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-1839960",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Policy Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.0.0",
"product": {
"name": "vers:oracle/9.0.0",
"product_id": "CSAFPID-2699093",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.1",
"product": {
"name": "vers:oracle/9.0.1",
"product_id": "CSAFPID-2699092",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.2",
"product": {
"name": "vers:oracle/9.0.2",
"product_id": "CSAFPID-2699091",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.3",
"product": {
"name": "vers:oracle/9.0.3",
"product_id": "CSAFPID-2699090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2699124",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Report Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.1.1.9",
"product": {
"name": "vers:oracle/9.1.1.9",
"product_id": "CSAFPID-2698959",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sd-wan_edge:9.1.1.9:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle SD-WAN Edge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/22.4.0",
"product": {
"name": "vers:oracle/22.4.0",
"product_id": "CSAFPID-2699181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/23.4.4",
"product": {
"name": "vers:oracle/23.4.4",
"product_id": "CSAFPID-1839930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.1",
"product": {
"name": "vers:oracle/24.1.1",
"product_id": "CSAFPID-1839933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-1839931",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-1839963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839932",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/25.1.100",
"product": {
"name": "vers:oracle/25.1.100",
"product_id": "CSAFPID-2698956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:25.1.100:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
"product": {
"name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
"product_id": "CSAFPID-2699180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0-23.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/10.0.0",
"product": {
"name": "vers:oracle/10.0.0",
"product_id": "CSAFPID-2699083",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.2.0",
"product": {
"name": "vers:oracle/9.2.0",
"product_id": "CSAFPID-1839887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.3.0",
"product": {
"name": "vers:oracle/9.3.0",
"product_id": "CSAFPID-1839889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/4.1.0",
"product": {
"name": "vers:oracle/4.1.0",
"product_id": "CSAFPID-1839888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/4.2.0",
"product": {
"name": "vers:oracle/4.2.0",
"product_id": "CSAFPID-1839886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Communications Broker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0",
"product": {
"name": "vers:oracle/24.1.0",
"product_id": "CSAFPID-1839925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1840027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2699041",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
"product": {
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
"product_id": "CSAFPID-2698961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0-24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Analytics Data Director"
}
],
"category": "product_family",
"name": "Oracle Communications"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
"product_id": "CSAFPID-1145869"
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
"product_id": "CSAFPID-1145271",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
"product_id": "CSAFPID-1173947",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
"product_id": "CSAFPID-1145868"
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
"product_id": "CSAFPID-1145270",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
"product_id": "CSAFPID-1173946",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.3",
"product": {
"name": "vers:oracle/23.4.3",
"product_id": "CSAFPID-1173942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1173945",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.2",
"product": {
"name": "vers:oracle/23.4.2",
"product_id": "CSAFPID-1173940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1173941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.4",
"product": {
"name": "vers:oracle/23.4.4",
"product_id": "CSAFPID-1173965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1173967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.2",
"product": {
"name": "vers:oracle/23.4.2",
"product_id": "CSAFPID-1173943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1173944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.0",
"product": {
"name": "vers:oracle/23.4.0",
"product_id": "CSAFPID-1145265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0",
"product": {
"name": "vers:oracle/24.1.0",
"product_id": "CSAFPID-1145273",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1174046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/7.3.6",
"product": {
"name": "vers:oracle/7.3.6",
"product_id": "CSAFPID-2699077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.4.0",
"product": {
"name": "vers:oracle/7.4.0",
"product_id": "CSAFPID-2699075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.0",
"product": {
"name": "vers:oracle/7.5.0",
"product_id": "CSAFPID-2699076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.5.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Integrity"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/6.0",
"product": {
"name": "vers:oracle/6.0",
"product_id": "CSAFPID-2699027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
"product": {
"name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
"product_id": "CSAFPID-1839852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
"product": {
"name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
"product_id": "CSAFPID-1840033",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=6.0|\u003c=6.1",
"product": {
"name": "vers:oracle/\u003e=6.0|\u003c=6.1",
"product_id": "CSAFPID-2698955",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0-6.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.0.0.8.0",
"product": {
"name": "vers:oracle/12.0.0.8.0",
"product_id": "CSAFPID-2699001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-2699084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1.0.0",
"product": {
"name": "vers:oracle/15.0.1.0.0",
"product_id": "CSAFPID-2699079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product": {
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product_id": "CSAFPID-2699058",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
"product": {
"name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
"product_id": "CSAFPID-1839957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
"product": {
"name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
"product_id": "CSAFPID-2699000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0-15.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
"product": {
"name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
"product_id": "CSAFPID-1839953",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Billing and Revenue Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.1.0.26.0",
"product": {
"name": "vers:oracle/8.1.0.26.0",
"product_id": "CSAFPID-2698964",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Messaging Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/6.3.1",
"product": {
"name": "vers:oracle/6.3.1",
"product_id": "CSAFPID-2698991",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications MetaSolv Solution"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.0.6.0.0",
"product": {
"name": "vers:oracle/12.0.6.0.0",
"product_id": "CSAFPID-2699127",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-2699126",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1.0.0",
"product": {
"name": "vers:oracle/15.0.1.0.0",
"product_id": "CSAFPID-2699128",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Charging and Control"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/7.4.0",
"product": {
"name": "vers:oracle/7.4.0",
"product_id": "CSAFPID-1839980",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.0",
"product": {
"name": "vers:oracle/7.5.0",
"product_id": "CSAFPID-1840004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.4.1",
"product": {
"name": "vers:oracle/7.4.1",
"product_id": "CSAFPID-1839981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-2699056",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1.0.0",
"product": {
"name": "vers:oracle/15.0.1.0.0",
"product_id": "CSAFPID-2699063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product": {
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product_id": "CSAFPID-2699060",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Pricing Design Center"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.0.0.3",
"product": {
"name": "vers:oracle/8.0.0.3",
"product_id": "CSAFPID-1839921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.0.0.4.0",
"product": {
"name": "vers:oracle/8.0.0.4.0",
"product_id": "CSAFPID-2698975",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.0.1",
"product": {
"name": "vers:oracle/8.1.0.1",
"product_id": "CSAFPID-1839922",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.0.2.0",
"product": {
"name": "vers:oracle/8.1.0.2.0",
"product_id": "CSAFPID-2698974",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Service Catalog and Design"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/7.4.1",
"product": {
"name": "vers:oracle/7.4.1",
"product_id": "CSAFPID-1839978",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.4.2",
"product": {
"name": "vers:oracle/7.4.2",
"product_id": "CSAFPID-1839979",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.0",
"product": {
"name": "vers:oracle/7.5.0",
"product_id": "CSAFPID-2699035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.1",
"product": {
"name": "vers:oracle/7.5.1",
"product_id": "CSAFPID-1839983",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.6.0",
"product": {
"name": "vers:oracle/7.6.0",
"product_id": "CSAFPID-1840005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.7.0",
"product": {
"name": "vers:oracle/7.7.0",
"product_id": "CSAFPID-2699034",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
"product": {
"name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
"product_id": "CSAFPID-2699036",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0-7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
"product": {
"name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
"product_id": "CSAFPID-2699096",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0-7.5.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Inventory Management"
}
],
"category": "product_family",
"name": "Oracle Communications Applications"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.0",
"product": {
"name": "vers:oracle/23.4.0",
"product_id": "CSAFPID-1145246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0",
"product": {
"name": "vers:oracle/24.1.0",
"product_id": "CSAFPID-1145247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:semver/7.4.0",
"product": {
"name": "vers:semver/7.4.0",
"product_id": "CSAFPID-2698653"
}
},
{
"category": "product_version_range",
"name": "vers:semver/7.4.1",
"product": {
"name": "vers:semver/7.4.1",
"product_id": "CSAFPID-2698654"
}
},
{
"category": "product_version_range",
"name": "vers:semver/7.5.0",
"product": {
"name": "vers:semver/7.5.0",
"product_id": "CSAFPID-2698655"
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
}
],
"category": "vendor",
"name": "Oracle Corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5388",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5388",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5388.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-5388"
},
{
"cve": "CVE-2023-5685",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5685",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-5685"
},
{
"cve": "CVE-2023-49582",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49582",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-49582"
},
{
"cve": "CVE-2023-51074",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51074.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-51074"
},
{
"cve": "CVE-2024-1135",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-1135"
},
{
"cve": "CVE-2024-4227",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4227",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4227.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-4227"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6763",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6763",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
}
],
"title": "CVE-2024-6763"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-12797",
"cwe": {
"id": "CWE-392",
"name": "Missing Report of Error Condition"
},
"notes": [
{
"category": "other",
"text": "Missing Report of Error Condition",
"title": "CWE-392"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12797",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12797.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-12797"
},
{
"cve": "CVE-2024-12798",
"cwe": {
"id": "CWE-917",
"name": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
"title": "CWE-917"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12798",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12798.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-12798"
},
{
"cve": "CVE-2024-21538",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21538",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21538.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-21538"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-28168",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28168",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-28168"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-31141",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31141",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31141.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-31141"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-40896",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-40896"
},
{
"cve": "CVE-2024-43044",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-43044"
},
{
"cve": "CVE-2024-43709",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43709.json"
}
],
"title": "CVE-2024-43709"
},
{
"cve": "CVE-2024-43796",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43796",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-43796"
},
{
"cve": "CVE-2024-47072",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-47072"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49767",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-52046",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-52046"
},
{
"cve": "CVE-2024-52303",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52303",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52303.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-52303"
},
{
"cve": "CVE-2024-53122",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Divide By Zero",
"title": "CWE-369"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53122",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53122.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-53122"
},
{
"cve": "CVE-2024-56128",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"notes": [
{
"category": "other",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56128",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-56128"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-1974",
"cwe": {
"id": "CWE-653",
"name": "Improper Isolation or Compartmentalization"
},
"notes": [
{
"category": "other",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-1974"
},
{
"cve": "CVE-2025-23084",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23084",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23084.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-23084"
},
{
"cve": "CVE-2025-23184",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json"
}
],
"title": "CVE-2025-23184"
},
{
"cve": "CVE-2025-24813",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24813",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-24813"
},
{
"cve": "CVE-2025-24928",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24928",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24928.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-24928"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-24970"
},
{
"cve": "CVE-2025-27516",
"cwe": {
"id": "CWE-1336",
"name": "Improper Neutralization of Special Elements Used in a Template Engine"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements Used in a Template Engine",
"title": "CWE-1336"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27516",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27516.json"
}
],
"title": "CVE-2025-27516"
},
{
"cve": "CVE-2025-27789",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27789",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27789.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-27789"
},
{
"cve": "CVE-2025-30729",
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30729",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30729.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-30729"
},
{
"cve": "CVE-2025-31721",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31721",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31721.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-31721"
}
]
}
ncsc-2025-0328
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle Database Server producten",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in Oracle Database Server stellen ongeauthenticeerde aanvallers in staat om ongeoorloofde toegang te verkrijgen tot kritieke gegevens, wat kan leiden tot schending van de vertrouwelijkheid, integriteit en beschikbaarheid van de data. Specifieke kwetsbaarheden, zoals die in de Portable Clusterware en de Unified Audit componenten, kunnen worden misbruikt door aanvallers met beperkte privileges, wat aanzienlijke risico\u0027s met zich meebrengt. De CVSS-scores vari\u00ebren van 2.7 tot 9.8, afhankelijk van de ernst van de kwetsbaarheid.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Improper Control of Document Type Definition",
"title": "CWE-827"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/docs/tech/security-alerts/cpuoct2025csaf.json"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2025-10-23T07:19:57.652532Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0328",
"initial_release_date": "2025-10-23T07:19:57.652532Z",
"revision_history": [
{
"date": "2025-10-23T07:19:57.652532Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Clusterware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Database Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Essbase"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "Essbase Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "GoldenGate Big Data and Application Adapters"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "GoldenGate Stream Analytics"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "GoldenGate for Big Data"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Goldengate Application Adapters"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "Goldengate Big Data"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "Goldengate Veridata"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "Graph Server And Client"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "Java Virtual Machine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "REST Data Services"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "SQLcl"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-13956",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Recent updates address vulnerabilities in various Oracle applications and Apache HttpComponents, with several rated as high risk, allowing potential remote exploitation affecting data integrity and system security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-13956 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-13956.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2024-52577",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "description",
"text": "Critical vulnerabilities in Oracle GoldenGate Stream Analytics and Apache Ignite could allow unauthenticated access and arbitrary code execution, respectively, with severe implications for system integrity and security.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52577 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-52577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2024-52577"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple security vulnerabilities across various Oracle products and the Netplex Json-smart library can lead to Denial of Service (DoS) due to stack exhaustion and other exploits, affecting versions 2.5.0 to 2.5.1 and specific Oracle software.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-4517",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Recent updates to Python versions 3.6 through 3.13.5 address multiple security vulnerabilities, particularly in the tarfile module, while enhancing various functionalities and resolving issues related to memory management and IPv6 handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4517 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4517.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-4517"
},
{
"cve": "CVE-2025-4949",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "other",
"text": "Improper Control of Document Type Definition",
"title": "CWE-827"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Database Server\u0027s SQLcl component and Eclipse JGit versions expose critical data to unauthorized access and denial of service through XML parsing flaws and require user interaction for exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/S:N/AU:Y/R:U/V:D/RE:L/U:Green",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4949 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4949.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-4949"
},
{
"cve": "CVE-2025-8885",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities in the Bouncy Castle Java library and Oracle GoldenGate products allow for excessive resource allocation and denial of service, affecting various versions and potentially leading to significant disruptions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8885 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8885.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-8885"
},
{
"cve": "CVE-2025-8916",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Bouncy Castle for Java and BCPKIX FIPS have a vulnerability allowing excessive resource allocation, while Oracle Communications Cloud Native Core Certificate Management and certain NetApp products face denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8916 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8916.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-8916"
},
{
"cve": "CVE-2025-48976",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Application Testing Suite and Apache Commons FileUpload, including DoS risks due to insufficient multipart header limits, have been identified, with CVSS scores reaching 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-52520",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Apache Tomcat versions 11.0.0-M1 to 11.0.8, 10.1.0-M1 to 10.1.42, and 9.0.0.M1 to 9.0.106 are vulnerable to Denial of Service due to an Integer Overflow vulnerability, while Oracle Graph Server versions 24.4.3 and 25.3.0 also exhibit a similar flaw.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52520 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52520.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-52520"
},
{
"cve": "CVE-2025-53047",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "A vulnerability in Oracle Database Server\u0027s Portable Clusterware component affects specific versions, allowing unauthenticated network attackers to access certain data, with a CVSS score of 5.8 indicating confidentiality impacts.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53047 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53047.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-53047"
},
{
"cve": "CVE-2025-53051",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "A vulnerability in Oracle Database Server\u0027s RDBMS Functional Index component (versions 23.4-23.9) allows high-privileged SYSDBA attackers to potentially gain unauthorized read access to certain data, with a CVSS 3.1 Base Score of 2.7.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53051 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53051.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-53051"
},
{
"cve": "CVE-2025-53864",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle GoldenGate and Connect2id Nimbus JOSE + JWT expose systems to denial of service attacks, with CVSS scores indicating significant availability impacts due to issues with deeply nested JSON objects.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53864.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-53864"
},
{
"cve": "CVE-2025-61749",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "A vulnerability in Oracle Database Server\u0027s Unified Audit component (versions 23.4-23.9) allows high-privileged DBA attackers to compromise audit integrity, with a CVSS 3.1 Base Score of 2.7.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61749 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61749.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-61749"
},
{
"cve": "CVE-2025-61763",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "A vulnerability in Oracle Essbase version 21.7.3.0.0 allows low-privileged attackers with HTTP access to compromise the system, posing significant risks to data integrity and confidentiality with a CVSS score of 8.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61763 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61763.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-61763"
},
{
"cve": "CVE-2025-61881",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "A vulnerability in the Java VM component of Oracle Database Server allows unauthenticated network attackers to compromise the Java VM, potentially leading to unauthorized data manipulation, with a CVSS 3.1 Base Score of 5.9.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61881.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14"
]
}
],
"title": "CVE-2025-61881"
}
]
}
ncsc-2025-0126
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle Enterprise Manager",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde aanvallers in staat om systemen te compromitteren via HTTP of SSH, wat kan leiden tot Denial-of-Service (DoS) of vertrouwelijke informatie openbaarmaking. Specifiek in de ObjectSerializationDecoder van Apache MINA is er een kritieke kwetsbaarheid die op afstand code-executie mogelijk maakt door een gebrek aan beveiligingscontroles in het deserialisatieproces. Dit betreft versies 2.0.X, 2.1.X, en 2.2.X. Daarnaast kunnen aanvallers ook gebruik maken van een kwetsbaarheid in Oracle\u0027s Primavera Gateway, die een Denial-of-Service kan veroorzaken.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Excessively Deep Nesting",
"title": "CWE-1124"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Enterprise Manager",
"tracking": {
"current_release_date": "2025-04-16T14:59:13.973935Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0126",
"initial_release_date": "2025-04-16T14:59:13.973935Z",
"revision_history": [
{
"date": "2025-04-16T14:59:13.973935Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/13.5.0.0",
"product": {
"name": "vers:unknown/13.5.0.0",
"product_id": "CSAFPID-1211244"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/13.5.0.0.0",
"product": {
"name": "vers:unknown/13.5.0.0.0",
"product_id": "CSAFPID-2698336"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.1.0.0.0",
"product": {
"name": "vers:unknown/24.1.0.0.0",
"product_id": "CSAFPID-2698337"
}
}
],
"category": "product_name",
"name": "Enterprise Manager Base Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/13.3.0.1",
"product": {
"name": "vers:unknown/13.3.0.1",
"product_id": "CSAFPID-1215022"
}
}
],
"category": "product_name",
"name": "Application Testing Suite"
}
],
"category": "product_family",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/13.5.0.0",
"product": {
"name": "vers:oracle/13.5.0.0",
"product_id": "CSAFPID-1145222",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Manager Base Platform"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/13.5.0.0.0",
"product": {
"name": "vers:oracle/13.5.0.0.0",
"product_id": "CSAFPID-2698939",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0.0.0",
"product": {
"name": "vers:oracle/24.1.0.0.0",
"product_id": "CSAFPID-2698940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:enterprise_manager_base_platform:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Manager Base Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/13.3.0.1",
"product": {
"name": "vers:oracle/13.3.0.1",
"product_id": "CSAFPID-1839876",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Application Testing Suite"
}
],
"category": "product_family",
"name": "Oracle Enterprise Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/13.3.0.1",
"product": {
"name": "vers:oracle/13.3.0.1",
"product_id": "CSAFPID-1144589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Application Testing Suite"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-45047",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211244",
"CSAFPID-2698336",
"CSAFPID-2698337",
"CSAFPID-1145222",
"CSAFPID-2698939",
"CSAFPID-2698940",
"CSAFPID-1215022",
"CSAFPID-1839876",
"CSAFPID-1144589"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45047",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45047.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211244",
"CSAFPID-2698336",
"CSAFPID-2698337",
"CSAFPID-1145222",
"CSAFPID-2698939",
"CSAFPID-2698940",
"CSAFPID-1215022",
"CSAFPID-1839876",
"CSAFPID-1144589"
]
}
],
"title": "CVE-2022-45047"
},
{
"cve": "CVE-2023-1370",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Excessively Deep Nesting",
"title": "CWE-1124"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211244",
"CSAFPID-2698336",
"CSAFPID-2698337",
"CSAFPID-1145222",
"CSAFPID-2698939",
"CSAFPID-2698940",
"CSAFPID-1215022",
"CSAFPID-1839876",
"CSAFPID-1144589"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-1370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-1370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211244",
"CSAFPID-2698336",
"CSAFPID-2698337",
"CSAFPID-1145222",
"CSAFPID-2698939",
"CSAFPID-2698940",
"CSAFPID-1215022",
"CSAFPID-1839876",
"CSAFPID-1144589"
]
}
],
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2024-52046",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211244",
"CSAFPID-2698336",
"CSAFPID-2698337",
"CSAFPID-1145222",
"CSAFPID-2698939",
"CSAFPID-2698940",
"CSAFPID-1215022",
"CSAFPID-1839876",
"CSAFPID-1144589"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211244",
"CSAFPID-2698336",
"CSAFPID-2698337",
"CSAFPID-1145222",
"CSAFPID-2698939",
"CSAFPID-2698940",
"CSAFPID-1215022",
"CSAFPID-1839876",
"CSAFPID-1144589"
]
}
],
"title": "CVE-2024-52046"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1211244",
"CSAFPID-2698336",
"CSAFPID-2698337",
"CSAFPID-1145222",
"CSAFPID-2698939",
"CSAFPID-2698940",
"CSAFPID-1215022",
"CSAFPID-1839876",
"CSAFPID-1144589"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1211244",
"CSAFPID-2698336",
"CSAFPID-2698337",
"CSAFPID-1145222",
"CSAFPID-2698939",
"CSAFPID-2698940",
"CSAFPID-1215022",
"CSAFPID-1839876",
"CSAFPID-1144589"
]
}
],
"title": "CVE-2024-57699"
}
]
}
ncsc-2025-0330
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communications producten, waaronder de Unified Assurance en Cloud Native Core.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in de Oracle Communications producten stellen kwaadwillenden in staat om ongeautoriseerde toegang te verkrijgen, wat kan leiden tot gedeeltelijke of volledige Denial-of-Service (DoS) aanvallen. Specifiek kunnen aanvallers met netwerktoegang de systemen compromitteren, wat resulteert in ongeautoriseerde toegang tot gevoelige gegevens. De CVSS-scores van deze kwetsbaarheden vari\u00ebren van 3.1 tot 9.8, wat wijst op een breed scala aan risico\u0027s, van beperkte tot ernstige impact op de vertrouwelijkheid, integriteit en beschikbaarheid van de systemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden in zijn Communications producten te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "general",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "general",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications producten",
"tracking": {
"current_release_date": "2025-10-23T13:20:15.363063Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0330",
"initial_release_date": "2025-10-23T13:20:15.363063Z",
"revision_history": [
{
"date": "2025-10-23T13:20:15.363063Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Oracle Communications Billing and Revenue Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "Oracle Communications Calendar Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Automated Test Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core DBTier"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Slice Selection Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "Oracle Communications Converged Charging System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergent Charging Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "Oracle Communications Diameter Signaling Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE Element Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE LNP Application Processor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "Oracle Communications LSMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "Oracle Communications Messaging Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Analytics Data Director"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Charging and Control"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Integrity"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "Oracle Communications Offline Mediation Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "Oracle Communications Operations Monitor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "Oracle Communications Pricing Design Center"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "Oracle Communications Service Catalog and Design"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-33"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-34"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Inventory Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-35"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Communications Broker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-36"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Operations Monitor"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent updates address vulnerabilities in NTP 4.2.8p17 and Oracle products, including CVE-2023-26555 related to malformed RT-11 dates and various security issues in Oracle Communications and Database systems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple vulnerabilities across various Oracle, IBM, and Protobuf products could lead to Denial of Service and unauthorized access, with significant risks identified in versions of Oracle Communications, MySQL Connector/J, and IBM WebSphere.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Communications products and the libpcap library allow high-privileged attackers to cause denial of service and NULL pointer dereference issues, with CVSS scores of 4.4 for the former.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Communications EAGLE LNP Application Processor, Oracle Communications Cloud Native Core Policy, and libtasn1 could lead to denial of service attacks, with CVSS scores of 5.3 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle MySQL, Oracle Communications, and nghttp2 products allow remote attackers to exploit confidentiality, integrity, and availability, with varying damage ratings from medium to high.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-35164",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Assurance and Apache Guacamole could allow high-privileged attackers to compromise systems and execute arbitrary code, respectively.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35164 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-35164.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-35164"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle products, including Communications and MySQL, as well as MIT Kerberos 5, allow for unauthorized access, denial of service, and other malicious activities, with CVSS scores reaching 9.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Middleware, Documaker, and Apache Commons IO components allow unauthenticated attackers to exploit denial of service risks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-50609",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Fluent Bit 3.1.9 has a vulnerability allowing remote Denial of Service attacks via a zero-length packet, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 can be exploited by high-privileged attackers for complete Denial of Service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50609 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50609.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-50609"
},
{
"cve": "CVE-2024-51504",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "description",
"text": "Recent vulnerabilities in Apache ZooKeeper and Oracle Communications Unified Assurance expose systems to authentication bypass and unauthorized access, allowing attackers to execute commands and access critical data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-51504 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-51504.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-51504"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple security vulnerabilities across various Oracle products and the Netplex Json-smart library can lead to Denial of Service (DoS) due to stack exhaustion and other exploits, affecting versions 2.5.0 to 2.5.1 and specific Oracle software.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Eclipse Jetty versions 12.0.0 to 12.0.16 are vulnerable to OutOfMemoryError and denial of service attacks due to improper validation of the SETTINGS_MAX_HEADER_LIST_SIZE parameter, affecting various products including Oracle Communications EAGLE and NetApp.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-1948"
},
{
"cve": "CVE-2025-3576",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "description",
"text": "Recent vulnerabilities in krb5 and MIT Kerberos implementations allow for message spoofing via MD5 checksum weaknesses, while Oracle Communications Network Analytics Data Director is susceptible to unauthorized data manipulation through SSH access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3576 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3576.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-3576"
},
{
"cve": "CVE-2025-4373",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and glib2 involve unauthorized access risks and buffer overflow issues, affecting multiple products with varying severity levels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4373 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4373.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-4517",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Recent updates to Python versions 3.6 through 3.13.5 address multiple security vulnerabilities, particularly in the tarfile module, while enhancing various functionalities and resolving issues related to memory management and IPv6 handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4517 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4517.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4517"
},
{
"cve": "CVE-2025-4802",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "description",
"text": "Vulnerabilities in Oracle Communications Cloud Native Core and glibc allow unauthenticated access and privilege escalation, with CVSS scores of 7.8, affecting confidentiality, integrity, and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4802 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4802.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4802"
},
{
"cve": "CVE-2025-5115",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "The \u0027MadeYouReset\u0027 vulnerability in HTTP/2 affects certain Jetty versions, allowing denial of service through malformed control frames, while additional vulnerabilities exist in Oracle Communications and SAP Commerce Cloud.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5115 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5115.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5115"
},
{
"cve": "CVE-2025-5318",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle MySQL Workbench and the libssh library expose sensitive data and allow unauthorized access, with CVSS scores indicating moderate severity.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5318.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5318"
},
{
"cve": "CVE-2025-5399",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle MySQL Server and Cluster, along with libcurl\u0027s WebSocket code, allow for various denial of service attacks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5399 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5399.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5399"
},
{
"cve": "CVE-2025-5889",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "The juliangruber brace-expansion library has a vulnerability in versions up to 4.0.0 affecting the expand function, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 are susceptible to a partial denial of service by low-privileged attackers.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5889 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5889.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5889"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "description",
"text": "Critical vulnerabilities in Oracle Communications Cloud Native Core and SQLite versions prior to 3.50.2 expose systems to severe risks, including memory corruption and integer truncation issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Green",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6965 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6965.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-7339",
"cwe": {
"id": "CWE-241",
"name": "Improper Handling of Unexpected Data Type"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing unauthorized data access, while the on-headers middleware for Node.js has a bug affecting response header modifications in versions prior to 1.1.0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7339 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7339.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7339"
},
{
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and libxslt expose systems to unauthorized access and memory corruption, with significant impacts on integrity and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2025-7962",
"cwe": {
"id": "CWE-147",
"name": "Improper Neutralization of Input Terminators"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Console and Jakarta Mail versions 2.0.2 and 2.2 expose systems to significant risks, including unauthorized access and SMTP Injection attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7962"
},
{
"cve": "CVE-2025-8058",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Enterprise Operations Monitor and GNU C library versions 2.4 to 2.41 expose systems to potential unauthorized access, memory corruption, and denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8058 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8058"
},
{
"cve": "CVE-2025-8916",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Bouncy Castle for Java and BCPKIX FIPS have a vulnerability allowing excessive resource allocation, while Oracle Communications Cloud Native Core Certificate Management and certain NetApp products face denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8916 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8916.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8916"
},
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "The curl update 8.14.1 addresses security vulnerabilities, including out-of-bounds reads, proxy cache poisoning, and a bug allowing insecure sites to override secure cookies, alongside a denial of service vulnerability in Oracle Communications Unified Inventory Management.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9086 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9086.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-9086"
},
{
"cve": "CVE-2025-25724",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"notes": [
{
"category": "other",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Communications Network Analytics Data Director and the libarchive component, affecting system integrity and availability, with CVSS scores indicating significant risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-25724"
},
{
"cve": "CVE-2025-27210",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Node.js versions 20.x, 22.x, and 24.x have an incomplete fix for CVE-2025-23084 affecting Windows device names and the `path.join` API, while Oracle Communications\u0027 Cloud Native Environment has a non-exploitable Security-in-Depth issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27210 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27210.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27210"
},
{
"cve": "CVE-2025-27533",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache ActiveMQ and Oracle products allow for denial of service attacks due to improper validation and excessive memory allocation, affecting various versions and configurations.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:D/RE:M/U:Red",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27533 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27533.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27533"
},
{
"cve": "CVE-2025-27553",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Middleware and Apache Commons VFS expose critical data and allow unauthorized file access, with significant risks associated with their exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27553 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27553"
},
{
"cve": "CVE-2025-27587",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "description",
"text": "OpenSSL versions 3.0.0 to 3.3.2 on PowerPC are vulnerable to a Minerva attack, while Oracle Communications Cloud Native Core Certificate Management 25.1.200 has a critical data access vulnerability, and OpenSSL 3 has addressed timing side channel issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27587 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27587.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27587"
},
{
"cve": "CVE-2025-27817",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache Kafka and Oracle applications allow unauthorized access to sensitive data, with notable SSRF risks and CVSS scores of 7.5 for Oracle products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27817 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27817"
},
{
"cve": "CVE-2025-32415",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Java SE and libxml2, allowing for potential system compromise and denial of service, with CVSS scores of 7.5 for several issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32415 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32415.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-32728",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Enterprise Communications Broker, OpenSSH, and HP-UX Secure Shell daemon could lead to unauthorized data access and system compromise, with varying CVSS scores and exploitation potential.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32728 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32728.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32728"
},
{
"cve": "CVE-2025-32990",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Inventory Management and GnuTLS\u0027s certtool expose systems to denial-of-service and unauthorized data access, with significant integrity impacts and a CVSS score of 8.2 for Oracle\u0027s flaw.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32990 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32990"
},
{
"cve": "CVE-2025-48734",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "Recent updates to Apache Commons BeanUtils address multiple vulnerabilities, including arbitrary code execution risks and unauthorized access to Java enum properties, affecting versions prior to 1.11.0 and 2.0.0-M2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48734 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48734.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48734"
},
{
"cve": "CVE-2025-48924",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle WebLogic Server and Apache Commons Lang versions expose systems to denial of service risks, including an uncontrolled recursion flaw leading to StackOverflowErrors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-48976",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Application Testing Suite and Apache Commons FileUpload, including DoS risks due to insufficient multipart header limits, have been identified, with CVSS scores reaching 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Recent updates for Apache Tomcat versions 9, 10, and 11 address the \u0027MadeYouReset\u0027 DoS vulnerability in HTTP/2, along with various enhancements to components like Catalina and Coyote.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent updates for libxml2 address multiple vulnerabilities, including heap use after free and type confusion, which could lead to denial of service or crashes, alongside an Oracle vulnerability allowing unauthorized data access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49796 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing denial of service, while jackson-core versions prior to 2.15.0 can cause StackoverflowError with deeply nested data, now mitigated in version 2.15.0.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52999 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-53547",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "Helm v3.18.4 addresses a critical vulnerability allowing local code execution through crafted `Chart.yaml` and symlinked `Chart.lock` files during dependency updates, alongside an Oracle Communications flaw with a CVSS score of 8.6.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53547 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53547.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53547"
},
{
"cve": "CVE-2025-53643",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Operations Monitor and aiohttp could allow unauthorized access and data manipulation, with significant integrity impacts and request smuggling risks in affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53643 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53643.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53643"
},
{
"cve": "CVE-2025-53864",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle GoldenGate and Connect2id Nimbus JOSE + JWT expose systems to denial of service attacks, with CVSS scores indicating significant availability impacts due to issues with deeply nested JSON objects.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53864.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53864"
},
{
"cve": "CVE-2025-54090",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"notes": [
{
"category": "other",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Automated Test Suite and Apache HTTP Server 2.4.64 expose systems to unauthorized data access and potential denial of service, with a CVSS score of 6.3 for the Oracle issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-54090 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54090.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-54090"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Recent updates to Netty address critical vulnerabilities, including the \u0027MadeYouReset\u0027 DDoS attack in HTTP/2, which can lead to denial of service through resource exhaustion in various affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55163 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-57803",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "ImageMagick has addressed critical vulnerabilities in its BMP encoder, including a 32-bit integer overflow leading to heap corruption and potential code execution, alongside other security enhancements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-57803 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-57803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-57803"
},
{
"cve": "CVE-2025-58057",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Multiple vulnerabilities in decompressing decoders, including `BrotliDecoder`, and components of Oracle and HPE products can lead to denial of service through excessive buffer allocation and malformed HTTP/2 frames.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-58057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-58057"
},
{
"cve": "CVE-2025-59375",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "A memory amplification vulnerability in libexpat (CVE-2025-59375) allows excessive memory allocations from crafted XML input, affecting versions prior to 2.7.2, while a Security-in-Depth issue exists in Oracle Database Server\u0027s Perl component but is not exploitable.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59375 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59375.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-59375"
}
]
}
ncsc-2025-0123
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Oracle Database Producten en subsystemen, zoals Oracle Server, NoSQL, TimesTen, Secure Backup en Essbase.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om een Denial-of-Service te veroorzaken of om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en gegevens te manipuleren. Subcomponenten als de RDBMS Listener, Java VM, en andere componenten zijn specifiek kwetsbaar, met CVSS-scores vari\u00ebrend van 5.3 tot 7.5, wat duidt op een gematigd tot hoog risico.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "general",
"text": "Sensitive Information in Resource Not Removed Before Reuse",
"title": "CWE-226"
},
{
"category": "general",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Unprotected Transport of Credentials",
"title": "CWE-523"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
"title": "CWE-614"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database Producten",
"tracking": {
"current_release_date": "2025-04-16T08:37:39.412900Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0123",
"initial_release_date": "2025-04-16T08:37:39.412900Z",
"revision_history": [
{
"date": "2025-04-16T08:37:39.412900Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/22.1",
"product": {
"name": "vers:unknown/22.1",
"product_id": "CSAFPID-1304603"
}
}
],
"category": "product_name",
"name": "Database Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/13.5.0.0",
"product": {
"name": "vers:unknown/13.5.0.0",
"product_id": "CSAFPID-1201359"
}
}
],
"category": "product_name",
"name": "Enterprise Manager for Oracle Database"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
"product": {
"name": "vers:unknown/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
"product_id": "CSAFPID-2698376"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=21.3|\u003c=21.17",
"product": {
"name": "vers:unknown/\u003e=21.3|\u003c=21.17",
"product_id": "CSAFPID-2698377"
}
}
],
"category": "product_name",
"name": "GoldenGate"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.1",
"product": {
"name": "vers:oracle/23.1",
"product_id": "CSAFPID-1238473"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/2.0",
"product": {
"name": "vers:unknown/2.0",
"product_id": "CSAFPID-1237753"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/20.2",
"product": {
"name": "vers:unknown/20.2",
"product_id": "CSAFPID-1238475"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/23.1",
"product": {
"name": "vers:unknown/23.1",
"product_id": "CSAFPID-1296375"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-1237603"
}
}
],
"category": "product_name",
"name": "Big Data Spatial and Graph"
}
],
"category": "product_family",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.3|\u003c=19.22",
"product": {
"name": "vers:oracle/\u003e=19.3|\u003c=19.22",
"product_id": "CSAFPID-1145825"
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.3|\u003c=21.13",
"product": {
"name": "vers:oracle/\u003e=21.3|\u003c=21.13",
"product_id": "CSAFPID-1145826"
}
}
],
"category": "product_name",
"name": "Oracle Database Server"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.3|\u003c=19.26",
"product": {
"name": "vers:oracle/\u003e=19.3|\u003c=19.26",
"product_id": "CSAFPID-2698969",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.3|\u003c=21.17",
"product": {
"name": "vers:oracle/\u003e=21.3|\u003c=21.17",
"product_id": "CSAFPID-2698968",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.4|\u003c=21.16",
"product": {
"name": "vers:oracle/\u003e=21.4|\u003c=21.16",
"product_id": "CSAFPID-1839905",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_workload_manager:21.4-21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4|\u003c=23.7",
"product": {
"name": "vers:oracle/\u003e=23.4|\u003c=23.7",
"product_id": "CSAFPID-2698934",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.7:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Database Server"
}
],
"category": "product_family",
"name": "Oracle Database Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/13.5.0.0",
"product": {
"name": "vers:oracle/13.5.0.0",
"product_id": "CSAFPID-1144644"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Manager for Oracle Database"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/1.5.0",
"product": {
"name": "vers:oracle/1.5.0",
"product_id": "CSAFPID-2699002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/1.6.0",
"product": {
"name": "vers:oracle/1.6.0",
"product_id": "CSAFPID-2699003",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/1.6.1",
"product": {
"name": "vers:oracle/1.6.1",
"product_id": "CSAFPID-2699004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.6.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle NoSQL Database"
}
],
"category": "product_family",
"name": "Oracle NoSQL Database"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=22.1.1.1.0|\u003c=22.1.1.30.0",
"product": {
"name": "vers:oracle/\u003e=22.1.1.1.0|\u003c=22.1.1.30.0",
"product_id": "CSAFPID-2699053",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:timesten_in-memory_database:22.1.1.1.0-22.1.1.30.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle TimesTen In-Memory Database"
}
],
"category": "product_family",
"name": "Oracle TimesTen In-Memory Database"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/25.1.0",
"product": {
"name": "vers:oracle/25.1.0",
"product_id": "CSAFPID-2698932",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:25.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/25.2.0",
"product": {
"name": "vers:oracle/25.2.0",
"product_id": "CSAFPID-2698931",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:25.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.8.0|\u003c=23.11.0",
"product": {
"name": "vers:oracle/\u003e=23.8.0|\u003c=23.11.0",
"product_id": "CSAFPID-2698930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.8.0-23.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.11.0",
"product": {
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.11.0",
"product_id": "CSAFPID-2698933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:24.1.0-24.11.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Autonomous Health Framework"
}
],
"category": "product_family",
"name": "Oracle Autonomous Health Framework"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/21.7.1.0.0",
"product": {
"name": "vers:oracle/21.7.1.0.0",
"product_id": "CSAFPID-2698943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.7.1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Essbase"
}
],
"category": "product_family",
"name": "Oracle Essbase"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.10",
"product": {
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.10",
"product_id": "CSAFPID-2698949",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.10:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "GoldenGate Stream Analytics"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
"product": {
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
"product_id": "CSAFPID-2698941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.26.0.0.250219:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.3|\u003c=21.17",
"product": {
"name": "vers:oracle/\u003e=21.3|\u003c=21.17",
"product_id": "CSAFPID-2698942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4|\u003c=23.7",
"product": {
"name": "vers:oracle/\u003e=23.4|\u003c=23.7",
"product_id": "CSAFPID-2699022",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:23.4-23.7:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle GoldenGate"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.18",
"product": {
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.18",
"product_id": "CSAFPID-1839977",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=21.3.0.0.0|\u003c=21.16.0.0.0",
"product": {
"name": "vers:oracle/\u003e=21.3.0.0.0|\u003c=21.16.0.0.0",
"product_id": "CSAFPID-1840034",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4|\u003c=23.6",
"product": {
"name": "vers:oracle/\u003e=23.4|\u003c=23.6",
"product_id": "CSAFPID-1840035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle GoldenGate Big Data and Application Adapters"
}
],
"category": "product_family",
"name": "Oracle GoldenGate"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.7",
"product": {
"name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.7",
"product_id": "CSAFPID-1144602"
}
}
],
"category": "product_name",
"name": "Oracle GoldenGate Stream Analytics"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003c23.1",
"product": {
"name": "vers:oracle/\u003c23.1",
"product_id": "CSAFPID-1145800"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/2.0",
"product": {
"name": "vers:unknown/2.0",
"product_id": "CSAFPID-356315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ibm:oracle_big_data_spatial_and_graph:2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/23.1",
"product": {
"name": "vers:unknown/23.1",
"product_id": "CSAFPID-356152"
}
}
],
"category": "product_name",
"name": "Big Data Spatial and Graph"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.3",
"product": {
"name": "vers:oracle/23.4.3",
"product_id": "CSAFPID-2699065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2699066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/23.4.4",
"product": {
"name": "vers:oracle/23.4.4",
"product_id": "CSAFPID-1840017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.4.0",
"product": {
"name": "vers:oracle/24.4.0",
"product_id": "CSAFPID-1840013",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:24.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Graph Server and Client"
}
],
"category": "product_family",
"name": "Oracle Graph Server and Client"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003c=22.4.7",
"product": {
"name": "vers:oracle/\u003c=22.4.7",
"product_id": "CSAFPID-1145419",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:22.4.7_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003c=23.4.2",
"product": {
"name": "vers:oracle/\u003c=23.4.2",
"product_id": "CSAFPID-1145421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:23.4.2_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003c=24.1.0",
"product": {
"name": "vers:oracle/\u003c=24.1.0",
"product_id": "CSAFPID-1145422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graph_server_and_client:24.1.0_and_prior:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Graph Server and Client"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/3.0.6",
"product": {
"name": "vers:oracle/3.0.6",
"product_id": "CSAFPID-1145420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:big_data_spatial_and_graph:3.0.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Big Data Spatial and Graph"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.1.0.1",
"product": {
"name": "vers:oracle/12.1.0.1",
"product_id": "CSAFPID-2699109",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:12.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/12.1.0.2",
"product": {
"name": "vers:oracle/12.1.0.2",
"product_id": "CSAFPID-2699107",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:12.1.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/12.1.0.3",
"product": {
"name": "vers:oracle/12.1.0.3",
"product_id": "CSAFPID-2699106",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:12.1.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/18.1.0.0",
"product": {
"name": "vers:oracle/18.1.0.0",
"product_id": "CSAFPID-2699110",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/18.1.0.1",
"product": {
"name": "vers:oracle/18.1.0.1",
"product_id": "CSAFPID-2698972",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/18.1.0.2",
"product": {
"name": "vers:oracle/18.1.0.2",
"product_id": "CSAFPID-2699108",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Secure Backup"
}
],
"category": "product_family",
"name": "Oracle Secure Backup"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:semver/19.3|\u003c=19.26",
"product": {
"name": "vers:semver/19.3|\u003c=19.26",
"product_id": "CSAFPID-2698485"
}
},
{
"category": "product_version_range",
"name": "vers:semver/21.3|\u003c=21.17",
"product": {
"name": "vers:semver/21.3|\u003c=21.17",
"product_id": "CSAFPID-2698486"
}
},
{
"category": "product_version_range",
"name": "vers:semver/23.4|\u003c=23.7",
"product": {
"name": "vers:semver/23.4|\u003c=23.7",
"product_id": "CSAFPID-2698487"
}
}
],
"category": "product_name",
"name": "Oracle Database Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:semver/12.1.0.1",
"product": {
"name": "vers:semver/12.1.0.1",
"product_id": "CSAFPID-2698463"
}
},
{
"category": "product_version_range",
"name": "vers:semver/12.1.0.2",
"product": {
"name": "vers:semver/12.1.0.2",
"product_id": "CSAFPID-2698464"
}
},
{
"category": "product_version_range",
"name": "vers:semver/12.1.0.3",
"product": {
"name": "vers:semver/12.1.0.3",
"product_id": "CSAFPID-2698465"
}
},
{
"category": "product_version_range",
"name": "vers:semver/18.1.0.0",
"product": {
"name": "vers:semver/18.1.0.0",
"product_id": "CSAFPID-2698466"
}
},
{
"category": "product_version_range",
"name": "vers:semver/18.1.0.1",
"product": {
"name": "vers:semver/18.1.0.1",
"product_id": "CSAFPID-2698467"
}
},
{
"category": "product_version_range",
"name": "vers:semver/18.1.0.2",
"product": {
"name": "vers:semver/18.1.0.2",
"product_id": "CSAFPID-2698468"
}
}
],
"category": "product_name",
"name": "Oracle Secure Backup"
}
],
"category": "vendor",
"name": "Oracle Corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-1935",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-1935",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-1935.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-1935"
},
{
"cve": "CVE-2020-1938",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-1938",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-1938.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-1938"
},
{
"cve": "CVE-2020-9484",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-9484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-9484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-9484"
},
{
"cve": "CVE-2020-11996",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-11996",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-11996.json"
}
],
"title": "CVE-2020-11996"
},
{
"cve": "CVE-2020-13935",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-13935",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13935.json"
}
],
"title": "CVE-2020-13935"
},
{
"cve": "CVE-2020-13943",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-13943",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13943.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-13943"
},
{
"cve": "CVE-2020-36843",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-36843",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-36843.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2020-36843"
},
{
"cve": "CVE-2021-24122",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-24122",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-24122.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-24122"
},
{
"cve": "CVE-2021-25122",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-25122",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-25122.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-25122"
},
{
"cve": "CVE-2021-25329",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-25329",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-25329.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-25329"
},
{
"cve": "CVE-2021-30640",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-30640",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-30640.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-30640"
},
{
"cve": "CVE-2021-33037",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-33037",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-33037.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-33037"
},
{
"cve": "CVE-2021-41079",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-41079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-41079"
},
{
"cve": "CVE-2021-41184",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-41184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41184.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-41184"
},
{
"cve": "CVE-2021-42575",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-42575",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-42575.json"
}
],
"title": "CVE-2021-42575"
},
{
"cve": "CVE-2021-43980",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-43980",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-43980.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2021-43980"
},
{
"cve": "CVE-2022-3786",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"notes": [
{
"category": "other",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-3786",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2022-3786"
},
{
"cve": "CVE-2022-25762",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"notes": [
{
"category": "other",
"text": "Sensitive Information in Resource Not Removed Before Reuse",
"title": "CWE-226"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-25762",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-25762.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2022-25762"
},
{
"cve": "CVE-2022-42252",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42252",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42252.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2022-42252"
},
{
"cve": "CVE-2023-28708",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Unprotected Transport of Credentials",
"title": "CWE-523"
},
{
"category": "other",
"text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
"title": "CWE-614"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28708",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28708.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-28708"
},
{
"cve": "CVE-2023-34053",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-34053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-34053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-34053"
},
{
"cve": "CVE-2023-41080",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-41080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41080.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-41080"
},
{
"cve": "CVE-2023-42795",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "other",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-42795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-42795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-42795"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45648",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45648",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45648.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-45648"
},
{
"cve": "CVE-2023-46589",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46589",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2023-46589"
},
{
"cve": "CVE-2024-6763",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6763",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
}
],
"title": "CVE-2024-6763"
},
{
"cve": "CVE-2024-8176",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8176",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8176.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-8176"
},
{
"cve": "CVE-2024-8184",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8184.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-8184"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-11233",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-11233"
},
{
"cve": "CVE-2024-11234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11234",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11234.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-11234"
},
{
"cve": "CVE-2024-11236",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11236.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-11236"
},
{
"cve": "CVE-2024-13176",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-13176",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13176.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-13176"
},
{
"cve": "CVE-2024-23672",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "other",
"text": "Incomplete Cleanup",
"title": "CWE-459"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23672",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-23672"
},
{
"cve": "CVE-2024-24549",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-36114",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36114",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36114.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-36114"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39338",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39338",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39338.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-39338"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-53382",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53382",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53382.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-53382"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-21578",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21578",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21578.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-21578"
},
{
"cve": "CVE-2025-24813",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24813",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-24813"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-24970"
},
{
"cve": "CVE-2025-25193",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25193",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-25193.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-25193"
},
{
"cve": "CVE-2025-26791",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-26791"
},
{
"cve": "CVE-2025-30694",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30694",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30694.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30694"
},
{
"cve": "CVE-2025-30701",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30701",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30701.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30701"
},
{
"cve": "CVE-2025-30702",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30702",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30702.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30702"
},
{
"cve": "CVE-2025-30733",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30733",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30733.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30733"
},
{
"cve": "CVE-2025-30736",
"product_status": {
"known_affected": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1304603",
"CSAFPID-1201359",
"CSAFPID-1145825",
"CSAFPID-2698969",
"CSAFPID-1145826",
"CSAFPID-2698968",
"CSAFPID-1839905",
"CSAFPID-2698934",
"CSAFPID-1144644",
"CSAFPID-2699002",
"CSAFPID-2699003",
"CSAFPID-2699004",
"CSAFPID-2699053",
"CSAFPID-2698485",
"CSAFPID-2698486",
"CSAFPID-2698487",
"CSAFPID-2698932",
"CSAFPID-2698931",
"CSAFPID-2698930",
"CSAFPID-2698933",
"CSAFPID-2698943",
"CSAFPID-2698376",
"CSAFPID-2698377",
"CSAFPID-2698949",
"CSAFPID-2698941",
"CSAFPID-2698942",
"CSAFPID-2699022",
"CSAFPID-1839977",
"CSAFPID-1840034",
"CSAFPID-1840035",
"CSAFPID-1144602",
"CSAFPID-1238473",
"CSAFPID-1145800",
"CSAFPID-356315",
"CSAFPID-1237753",
"CSAFPID-1238475",
"CSAFPID-1296375",
"CSAFPID-356152",
"CSAFPID-1237603",
"CSAFPID-2699065",
"CSAFPID-2699066",
"CSAFPID-1840017",
"CSAFPID-1840013",
"CSAFPID-1145419",
"CSAFPID-1145421",
"CSAFPID-1145422",
"CSAFPID-1145420",
"CSAFPID-2699109",
"CSAFPID-2699107",
"CSAFPID-2699106",
"CSAFPID-2699110",
"CSAFPID-2698972",
"CSAFPID-2699108",
"CSAFPID-2698463",
"CSAFPID-2698464",
"CSAFPID-2698465",
"CSAFPID-2698466",
"CSAFPID-2698467",
"CSAFPID-2698468"
]
}
],
"title": "CVE-2025-30736"
}
]
}
ncsc-2025-0329
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in verschillende subcomponenten van Oracle Commerce producten, waaronder Oracle Middleware Common Libraries, Oracle Documaker, Oracle WebCenter Forms Recognition, Oracle WebLogic Server, en Oracle Application Testing Suite.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde aanvallers in staat om gedeeltelijke of volledige Denial of Service (DoS) te veroorzaken, met CVSS-scores vari\u00ebrend van 2.7 tot 7.5. Dit kan leiden tot systeemuitval en ongeoorloofde toegang tot gegevens. Aanvallers kunnen deze kwetsbaarheden misbruiken door specifieke verzoeken te sturen die de systemen overbelasten of door gebruik te maken van onbetrouwbare invoer. De kwetsbaarheden zijn aangetroffen in verschillende versies van de betrokken producten, wat de impact vergroot.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/docs/tech/security-alerts/cpuoct2025csaf.json"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Commerce",
"tracking": {
"current_release_date": "2025-10-23T07:20:51.213314Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0329",
"initial_release_date": "2025-10-23T07:20:51.213314Z",
"revision_history": [
{
"date": "2025-10-23T07:20:51.213314Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Commerce"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Oracle Commerce Guided Search"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Oracle Commerce Platform"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Middleware, Documaker, and Apache Commons IO components allow unauthenticated attackers to exploit denial of service risks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple security vulnerabilities across various Oracle products and the Netplex Json-smart library can lead to Denial of Service (DoS) due to stack exhaustion and other exploits, affecting versions 2.5.0 to 2.5.1 and specific Oracle software.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-22233",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "CVE-2024-38820 identifies a vulnerability in the Spring Framework affecting multiple versions, while a separate issue in the Oracle Commerce Platform\u0027s Dynamo Application Framework allows low-privileged attackers to manipulate data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22233 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-22233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-22233"
},
{
"cve": "CVE-2025-48795",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle WebCenter Forms Recognition and Apache CXF expose systems to data compromise and denial of service risks, with CVSS scores indicating significant impacts on confidentiality, integrity, and availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48795 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-48795"
},
{
"cve": "CVE-2025-48924",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle WebLogic Server and Apache Commons Lang versions expose systems to denial of service risks, including an uncontrolled recursion flaw leading to StackOverflowErrors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-48976",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Application Testing Suite and Apache Commons FileUpload, including DoS risks due to insufficient multipart header limits, have been identified, with CVSS scores reaching 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Recent updates for Apache Tomcat versions 9, 10, and 11 address the \u0027MadeYouReset\u0027 DoS vulnerability in HTTP/2, along with various enhancements to components like Catalina and Coyote.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Recent updates to Netty address critical vulnerabilities, including the \u0027MadeYouReset\u0027 DDoS attack in HTTP/2, which can lead to denial of service through resource exhaustion in various affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55163 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-55163"
}
]
}
ncsc-2025-0127
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in verschillende Financial Services producten",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen niet-geauthenticeerde kwaadwillenden in staat om via HTTP toegang te krijgen tot kritieke gegevens, wat kan leiden tot ongeautoriseerde gegevenstoegang en andere beveiligingsrisico\u0027s. Kwaadwillenden kunnen ook gebruik maken van misconfiguraties en kwetsbaarheden in de software om privilege-escalatie, denial-of-service en remote code execution uit te voeren.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Storage of Sensitive Data in a Mechanism without Access Control",
"title": "CWE-921"
},
{
"category": "general",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Financial Services",
"tracking": {
"current_release_date": "2025-04-16T15:00:12.952979Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0127",
"initial_release_date": "2025-04-16T15:00:12.952979Z",
"revision_history": [
{
"date": "2025-04-16T15:00:12.952979Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/8.1.2.7.0",
"product": {
"name": "vers:unknown/8.1.2.7.0",
"product_id": "CSAFPID-2698335"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/8.1.3.0",
"product": {
"name": "vers:unknown/8.1.3.0",
"product_id": "CSAFPID-1838588"
}
}
],
"category": "product_name",
"name": "Financial Services Model Management and Governance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/8.0.7.8",
"product": {
"name": "vers:unknown/8.0.7.8",
"product_id": "CSAFPID-1838570"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/8.0.8.6",
"product": {
"name": "vers:unknown/8.0.8.6",
"product_id": "CSAFPID-1838583"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/8.1.1.4",
"product": {
"name": "vers:unknown/8.1.1.4",
"product_id": "CSAFPID-2698354"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/8.1.2.5",
"product": {
"name": "vers:unknown/8.1.2.5",
"product_id": "CSAFPID-1838577"
}
}
],
"category": "product_name",
"name": "Financial Services Analytical Applications Infrastructure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/8.0.8.1",
"product": {
"name": "vers:unknown/8.0.8.1",
"product_id": "CSAFPID-1199519"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/8.1.2.7",
"product": {
"name": "vers:unknown/8.1.2.7",
"product_id": "CSAFPID-1838573"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/8.1.2.8",
"product": {
"name": "vers:unknown/8.1.2.8",
"product_id": "CSAFPID-1838574"
}
}
],
"category": "product_name",
"name": "Financial Services Behavior Detection Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/14.7.0.7.0",
"product": {
"name": "vers:unknown/14.7.0.7.0",
"product_id": "CSAFPID-2698380"
}
}
],
"category": "product_name",
"name": "Banking Liquidity Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/8.1.2.6",
"product": {
"name": "vers:unknown/8.1.2.6",
"product_id": "CSAFPID-1838589"
}
}
],
"category": "product_name",
"name": "Financial Services Compliance Studio"
}
],
"category": "product_family",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.1.2.6",
"product": {
"name": "vers:oracle/8.1.2.6",
"product_id": "CSAFPID-1839860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.2.7",
"product": {
"name": "vers:oracle/8.1.2.7",
"product_id": "CSAFPID-1839857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.2.7.0",
"product": {
"name": "vers:oracle/8.1.2.7.0",
"product_id": "CSAFPID-2699019",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.3.0",
"product": {
"name": "vers:oracle/8.1.3.0",
"product_id": "CSAFPID-1839858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Financial Services Model Management and Governance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/21.1.0.0.0",
"product": {
"name": "vers:oracle/21.1.0.0.0",
"product_id": "CSAFPID-2698953",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_apis:21.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/22.1.0.0.0",
"product": {
"name": "vers:oracle/22.1.0.0.0",
"product_id": "CSAFPID-2698951",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_apis:22.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/22.2.0.0.0",
"product": {
"name": "vers:oracle/22.2.0.0.0",
"product_id": "CSAFPID-2698952",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_apis:22.2.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Banking APIs"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/21.1.0.0.0",
"product": {
"name": "vers:oracle/21.1.0.0.0",
"product_id": "CSAFPID-2698992",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_digital_experience:21.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/22.1.0.0.0",
"product": {
"name": "vers:oracle/22.1.0.0.0",
"product_id": "CSAFPID-2698990",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/22.2.0.0.0",
"product": {
"name": "vers:oracle/22.2.0.0.0",
"product_id": "CSAFPID-2698994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.2.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Banking Digital Experience"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.0.7.8",
"product": {
"name": "vers:oracle/8.0.7.8",
"product_id": "CSAFPID-1839976",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.0.8.6",
"product": {
"name": "vers:oracle/8.0.8.6",
"product_id": "CSAFPID-1839966",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.8.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.1.4",
"product": {
"name": "vers:oracle/8.1.1.4",
"product_id": "CSAFPID-2699017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.2.5",
"product": {
"name": "vers:oracle/8.1.2.5",
"product_id": "CSAFPID-1839974",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.5:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Financial Services Analytical Applications Infrastructure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/5.1.0.0.0",
"product": {
"name": "vers:oracle/5.1.0.0.0",
"product_id": "CSAFPID-2699099",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:5.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/6.1.0.0.0",
"product": {
"name": "vers:oracle/6.1.0.0.0",
"product_id": "CSAFPID-2699100",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:6.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.0.0.0.0",
"product": {
"name": "vers:oracle/7.0.0.0.0",
"product_id": "CSAFPID-2699101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=2.9.0.0.0|\u003c=7.0.0.0.0",
"product": {
"name": "vers:oracle/\u003e=2.9.0.0.0|\u003c=7.0.0.0.0",
"product_id": "CSAFPID-1839884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.0.0.0-7.0.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Financial Services Revenue Management and Billing"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=14.4.0.0.0|\u003c=14.7.0.0.0",
"product": {
"name": "vers:oracle/\u003e=14.4.0.0.0|\u003c=14.7.0.0.0",
"product_id": "CSAFPID-1839866",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.4.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=14.5.0.0.0|\u003c=14.7.0.0.0",
"product": {
"name": "vers:oracle/\u003e=14.5.0.0.0|\u003c=14.7.0.0.0",
"product_id": "CSAFPID-2698995",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Banking Corporate Lending Process Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=14.5.0.0.0|\u003c=14.7.0.0.0",
"product": {
"name": "vers:oracle/\u003e=14.5.0.0.0|\u003c=14.7.0.0.0",
"product_id": "CSAFPID-1839867",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_origination:14.5.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Banking Origination"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.0.8.1",
"product": {
"name": "vers:oracle/8.0.8.1",
"product_id": "CSAFPID-1839881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.2.7",
"product": {
"name": "vers:oracle/8.1.2.7",
"product_id": "CSAFPID-1839880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.2.8",
"product": {
"name": "vers:oracle/8.1.2.8",
"product_id": "CSAFPID-1839882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.2.9",
"product": {
"name": "vers:oracle/8.1.2.9",
"product_id": "CSAFPID-2698954",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.9:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Financial Services Behavior Detection Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.0.8",
"product": {
"name": "vers:oracle/8.0.8",
"product_id": "CSAFPID-1839878",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.8:*:*:*:enterprise:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/14.7.0.7.0",
"product": {
"name": "vers:oracle/14.7.0.7.0",
"product_id": "CSAFPID-2698938",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.7.5.0.0",
"product": {
"name": "vers:oracle/14.7.5.0.0",
"product_id": "CSAFPID-1839923",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.5.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Banking Liquidity Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.1.2.6",
"product": {
"name": "vers:oracle/8.1.2.6",
"product_id": "CSAFPID-1839871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.2.9",
"product": {
"name": "vers:oracle/8.1.2.9",
"product_id": "CSAFPID-2699005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.9:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Financial Services Compliance Studio"
}
],
"category": "product_family",
"name": "Oracle Financial Services Applications"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:semver/5.1.0.0.0",
"product": {
"name": "vers:semver/5.1.0.0.0",
"product_id": "CSAFPID-2698450"
}
},
{
"category": "product_version_range",
"name": "vers:semver/6.1.0.0.0",
"product": {
"name": "vers:semver/6.1.0.0.0",
"product_id": "CSAFPID-2698451"
}
},
{
"category": "product_version_range",
"name": "vers:semver/7.0.0.0.0",
"product": {
"name": "vers:semver/7.0.0.0.0",
"product_id": "CSAFPID-2698452"
}
}
],
"category": "product_name",
"name": "Oracle Financial Services Revenue Management and Billing"
}
],
"category": "vendor",
"name": "Oracle Corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-28170",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-28170",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-28170.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2021-28170"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-49582",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49582",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2023-49582"
},
{
"cve": "CVE-2024-5206",
"cwe": {
"id": "CWE-921",
"name": "Storage of Sensitive Data in a Mechanism without Access Control"
},
"notes": [
{
"category": "other",
"text": "Storage of Sensitive Data in a Mechanism without Access Control",
"title": "CWE-921"
},
{
"category": "other",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5206",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5206.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-5206"
},
{
"cve": "CVE-2024-28168",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28168",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-28168"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-47072",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-47072"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-56128",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"notes": [
{
"category": "other",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56128",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-56128"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-21573",
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2025-21573"
},
{
"cve": "CVE-2025-23184",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json"
}
],
"title": "CVE-2025-23184"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2698335",
"CSAFPID-1838588",
"CSAFPID-1839860",
"CSAFPID-1839857",
"CSAFPID-2699019",
"CSAFPID-1839858",
"CSAFPID-2698953",
"CSAFPID-2698951",
"CSAFPID-2698952",
"CSAFPID-2698992",
"CSAFPID-2698990",
"CSAFPID-2698994",
"CSAFPID-1838570",
"CSAFPID-1838583",
"CSAFPID-2698354",
"CSAFPID-1839976",
"CSAFPID-1838577",
"CSAFPID-1839966",
"CSAFPID-2699017",
"CSAFPID-1839974",
"CSAFPID-2699099",
"CSAFPID-2699100",
"CSAFPID-2699101",
"CSAFPID-1839884",
"CSAFPID-2698450",
"CSAFPID-2698451",
"CSAFPID-2698452",
"CSAFPID-1839866",
"CSAFPID-2698995",
"CSAFPID-1839867",
"CSAFPID-1199519",
"CSAFPID-1838573",
"CSAFPID-1838574",
"CSAFPID-1839881",
"CSAFPID-1839880",
"CSAFPID-1839882",
"CSAFPID-2698954",
"CSAFPID-1839878",
"CSAFPID-2698380",
"CSAFPID-2698938",
"CSAFPID-1839923",
"CSAFPID-1838589",
"CSAFPID-1839871",
"CSAFPID-2699005"
]
}
],
"title": "CVE-2025-24970"
}
]
}
CERTFR-2025-AVI-0316
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Atlassian | Confluence | Confluence Data Center versions antérieures à 8.5.21 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 9.3.2 | ||
| Atlassian | Jira | Jira Software Server versions antérieures à 10.5.1 | ||
| Atlassian | Confluence | Confluence Server versions antérieures à 9.2.3 | ||
| Atlassian | Jira | Jira Service Management Server versions antérieures à 5.12.22 | ||
| Atlassian | Confluence | Confluence Server versions antérieures à 9.3.2 | ||
| Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.3.5 | ||
| Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.5.1 | ||
| Atlassian | Confluence | Confluence Server versions antérieures à 8.5.21 | ||
| Atlassian | Jira | Jira Software Server versions antérieures à 10.3.5 | ||
| Atlassian | Jira | Jira Service Management Server versions antérieures à 10.3.5 | ||
| Atlassian | Jira | Jira Service Management Server versions antérieures à 10.5.1 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 9.2.3 | ||
| Atlassian | Jira | Jira Software Server versions antérieures à 9.12.22 | ||
| Atlassian | Jira | Jira Service Management Data Center versions antérieures à 5.12.22 | ||
| Atlassian | Jira | Jira Software Data Center versions antérieures à 9.12.22 | ||
| Atlassian | Jira | Jira Software Data Center versions antérieures à 10.5.1 | ||
| Atlassian | Jira | Jira Software Data Center versions antérieures à 10.3.5 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 9.4.0 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.21",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.3.2",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.5.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions ant\u00e9rieures \u00e0 9.2.3",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.22",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions ant\u00e9rieures \u00e0 9.3.2",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.5.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.21",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.5.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.2.3",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.22",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.22",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.22",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.5.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.4.0",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-10172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
}
],
"initial_release_date": "2025-04-16T00:00:00",
"last_revision_date": "2025-04-16T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
"vendor_advisories": [
{
"published_at": "2025-04-15",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99547",
"url": "https://jira.atlassian.com/browse/CONFSERVER-99547"
},
{
"published_at": "2025-04-15",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26359",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26359"
},
{
"published_at": "2025-04-15",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16144",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16144"
},
{
"published_at": "2025-04-15",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99540",
"url": "https://jira.atlassian.com/browse/CONFSERVER-99540"
}
]
}
CERTFR-2025-AVI-0604
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Weblogic. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle WebLogic Server version 14.1.2.0.0",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server version 12.2.1.4.0",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server version 14.1.1.0.0",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-30753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30753"
},
{
"name": "CVE-2025-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50064"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50072"
},
{
"name": "CVE-2025-30762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30762"
},
{
"name": "CVE-2025-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50073"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2025-07-18T00:00:00",
"last_revision_date": "2025-07-18T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0604",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Weblogic. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Weblogic",
"vendor_advisories": [
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Weblogic cpujul2025",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
]
}
CERTFR-2025-AVI-0760
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | User Entity Behavior Analytics pour IBM QRadar SIEM versions antérieures à 5.0.1 | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | Db2 | Db2 on Cloud Pak for Data versions antérieures à v5.2.1 | ||
| IBM | WebSphere | IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de sécurité APAR PH67137 et APAR PH67132 | ||
| IBM | WebSphere | Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty ART versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Cloud Pak for Applications versions 5.1 à 5.3 pour WebSphere Application Server Liberty sans les correctifs de sécurité APAR PH67132 et APAR PH67137 | ||
| IBM | WebSphere | Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalités jsonp sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Hybrid Edition version 5.1 sans les correctifs de sécurité APAR PH67137, APAR PH67132, | ||
| IBM | Db2 | Db2 Warehouse on Cloud Pak for Data versions antérieures à v5.2.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "User Entity Behavior Analytics pour IBM QRadar SIEM versions ant\u00e9rieures \u00e0 5.0.1",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de s\u00e9curit\u00e9 APAR PH67137 et APAR PH67132",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty ART versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Applications versions 5.1 \u00e0 5.3 pour WebSphere Application Server Liberty sans les correctifs de s\u00e9curit\u00e9 APAR PH67132 et APAR PH67137",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalit\u00e9s jsonp sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition version 5.1 sans les correctifs de s\u00e9curit\u00e9 APAR PH67137, APAR PH67132,",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2025-0755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0755"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"name": "CVE-2024-51473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51473"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46762"
},
{
"name": "CVE-2025-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32421"
},
{
"name": "CVE-2016-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4055"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-30472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30472"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-45813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45813"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2025-48050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48050"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2025-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1647"
},
{
"name": "CVE-2023-39417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39417"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-33143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33143"
},
{
"name": "CVE-2021-3393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3393"
},
{
"name": "CVE-2025-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2533"
},
{
"name": "CVE-2019-10202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10202"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2025-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36010"
},
{
"name": "CVE-2025-36047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36047"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2022-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2025-48068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48068"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33114"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2023-22467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22467"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2019-9193",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9193"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-56332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2023-26133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26133"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2024-56339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56339"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2022-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
},
{
"name": "CVE-2024-49828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49828"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-29927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2017-18214",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18214"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-36071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36071"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2019-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2022-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2625"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2024-6762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6762"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2024-52894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52894"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-21756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
},
{
"name": "CVE-2018-1000873",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000873"
},
{
"name": "CVE-2023-32305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32305"
},
{
"name": "CVE-2025-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47287"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0760",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243927",
"url": "https://www.ibm.com/support/pages/node/7243927"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243923",
"url": "https://www.ibm.com/support/pages/node/7243923"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243924",
"url": "https://www.ibm.com/support/pages/node/7243924"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244012",
"url": "https://www.ibm.com/support/pages/node/7244012"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243659",
"url": "https://www.ibm.com/support/pages/node/7243659"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244002",
"url": "https://www.ibm.com/support/pages/node/7244002"
},
{
"published_at": "2025-08-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243582",
"url": "https://www.ibm.com/support/pages/node/7243582"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243928",
"url": "https://www.ibm.com/support/pages/node/7243928"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243925",
"url": "https://www.ibm.com/support/pages/node/7243925"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244010",
"url": "https://www.ibm.com/support/pages/node/7244010"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243922",
"url": "https://www.ibm.com/support/pages/node/7243922"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243673",
"url": "https://www.ibm.com/support/pages/node/7243673"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243877",
"url": "https://www.ibm.com/support/pages/node/7243877"
}
]
}
CERTFR-2025-AVI-0337
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling Connect:Direct Web Services versions 6.1.x antérieures à 6.1.0.28 | ||
| IBM | QRadar | QRadar Suite Software versions 1.1x.x.x antérieures à 1.11.2.x | ||
| IBM | Cloud Pak | Cloud Pak for Security versions 1.1x.x.x antérieures à 1.11.2.x | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.6.0 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect:Direct Web Services versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.28",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.1x.x.x ant\u00e9rieures \u00e0 1.11.2.x",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions 1.1x.x.x ant\u00e9rieures \u00e0 1.11.2.x",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.6.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6531"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2020-35494",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35494"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2020-35496",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35496"
},
{
"name": "CVE-2024-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-45813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45813"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2025-1302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1302"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2018-18700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18700"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-35495",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35495"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2024-42461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
},
{
"name": "CVE-2024-29180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29180"
},
{
"name": "CVE-2019-12972",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12972"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2020-35507",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35507"
},
{
"name": "CVE-2020-35493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35493"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
}
],
"initial_release_date": "2025-04-18T00:00:00",
"last_revision_date": "2025-04-18T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0337",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Injection SQL (SQLi)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-04-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7230739",
"url": "https://www.ibm.com/support/pages/node/7230739"
},
{
"published_at": "2025-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7231169",
"url": "https://www.ibm.com/support/pages/node/7231169"
},
{
"published_at": "2025-04-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7231051",
"url": "https://www.ibm.com/support/pages/node/7231051"
}
]
}
CERTFR-2025-AVI-0909
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle ZFS Storage Appliance Kit version 8.8",
"product": {
"name": "Systems",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris version 11",
"product": {
"name": "Systems",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris Cluster version 4",
"product": {
"name": "Systems",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-62477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62477"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-62289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62289"
},
{
"name": "CVE-2020-17521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17521"
},
{
"name": "CVE-2025-62290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62290"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53070"
},
{
"name": "CVE-2025-62480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62480"
},
{
"name": "CVE-2025-53046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53046"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-62478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62478"
},
{
"name": "CVE-2025-62476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62476"
},
{
"name": "CVE-2025-62475",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62475"
},
{
"name": "CVE-2025-62479",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62479"
},
{
"name": "CVE-2025-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53068"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2025-10-22T00:00:00",
"last_revision_date": "2025-10-22T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0909",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
"vendor_advisories": [
{
"published_at": "2025-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Systems cpuoct2025",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
}
]
}
CERTFR-2025-AVI-0520
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Atlassian | Jira | Jira Service Management Server versions 10.6.x antérieures à 10.6.1 | ||
| Atlassian | Jira | Jira Software Data Center versions 10.6.x antérieures à 10.6.1 | ||
| Atlassian | Confluence | Confluence Data Center versions 9.5.x antérieures à 9.5.1 | ||
| Atlassian | Jira | Jira Service Management Server versions antérieures à 10.3.6 | ||
| Atlassian | Jira | Jira Service Management Data Center versions 10.6.x antérieures à 10.6.1 | ||
| Atlassian | Jira | Jira Software Server versions antérieures à 10.6.1 | ||
| Atlassian | Confluence | Confluence Data Center versions 9.2.x antérieures à 9.2.5 | ||
| Atlassian | Jira | Jira Software Data Center versions antérieures à 10.3.6 | ||
| Atlassian | Confluence | Confluence Server versions 9.5.x antérieures à 9.5.1 | ||
| Atlassian | Confluence | Confluence Server versions 9.2.x antérieures à 9.2.5 | ||
| Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.3.6 | ||
| Atlassian | Confluence | Confluence Data Center versions 9.4.x antérieures à 9.4.1 | ||
| Atlassian | Confluence | Confluence Server versions antérieures à 8.5.23 | ||
| Atlassian | Confluence | Confluence Data Center versions antérieures à 8.5.23 | ||
| Atlassian | Confluence | Confluence Server versions 9.4.x antérieures à 9.4.1 | ||
| Atlassian | Jira | Jira Software Server versions antérieures à 10.3.6 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Jira Service Management Server versions 10.6.x ant\u00e9rieures \u00e0 10.6.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions 10.6.x ant\u00e9rieures \u00e0 10.6.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 9.5.x ant\u00e9rieures \u00e0 9.5.1",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions 10.6.x ant\u00e9rieures \u00e0 10.6.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.6.1",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 9.5.x ant\u00e9rieures \u00e0 9.5.1",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.23",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.23",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Server versions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Jira",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
}
],
"initial_release_date": "2025-06-18T00:00:00",
"last_revision_date": "2025-06-18T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0520",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
"vendor_advisories": [
{
"published_at": "2025-06-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99921",
"url": "https://jira.atlassian.com/browse/CONFSERVER-99921"
},
{
"published_at": "2025-06-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99835",
"url": "https://jira.atlassian.com/browse/CONFSERVER-99835"
},
{
"published_at": "2025-06-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16260",
"url": "https://jira.atlassian.com/browse/JSDSERVER-16260"
},
{
"published_at": "2025-06-17",
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26411",
"url": "https://jira.atlassian.com/browse/JSWSERVER-26411"
}
]
}
fkie_cve-2024-57699
Vulnerability from fkie_nvd
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of \u2019{\u2019, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un problema de seguridad en Netplex Json-smart 2.5.0 a 2.5.1. Al cargar una entrada JSON manipulado especial, que contiene una gran cantidad de \u2019{\u2019, se puede activar un agotamiento de la pila, lo que podr\u00eda permitir que un atacante provoque una denegaci\u00f3n de servicio (DoS). Este problema existe debido a una correcci\u00f3n incompleta de CVE-2023-1370."
}
],
"id": "CVE-2024-57699",
"lastModified": "2025-02-06T16:15:41.170",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-02-05T22:15:33.183",
"references": [
{
"source": "cve@mitre.org",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"source": "cve@mitre.org",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-674"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
ghsa-pq2g-wx69-c263
Vulnerability from github
A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of ’{’, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.
The fixed version only addresses the default modes provided by JSONParser, such as MODE_RFC4627. If you create the JSONParser manually or with custom options, make sure to set the LIMIT_JSON_DEPTH option.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "net.minidev:json-smart"
},
"ranges": [
{
"events": [
{
"introduced": "2.5.0"
},
{
"fixed": "2.5.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-57699"
],
"database_specific": {
"cwe_ids": [
"CWE-674"
],
"github_reviewed": true,
"github_reviewed_at": "2025-02-06T19:01:17Z",
"nvd_published_at": "2025-02-05T22:15:33Z",
"severity": "HIGH"
},
"details": "A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of \u2019{\u2019, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.\n\nThe fixed version only addresses the default modes provided by [JSONParser](https://github.com/netplex/json-smart-v2/blob/master/json-smart/src/main/java/net/minidev/json/parser/JSONParser.java#L118), such as `MODE_RFC4627`. If you create the JSONParser manually or with custom options, make sure to set the `LIMIT_JSON_DEPTH` option.",
"id": "GHSA-pq2g-wx69-c263",
"modified": "2025-03-12T14:28:04Z",
"published": "2025-02-06T06:31:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"type": "WEB",
"url": "https://github.com/netplex/json-smart-v2/issues/232"
},
{
"type": "WEB",
"url": "https://github.com/netplex/json-smart-v2/issues/233"
},
{
"type": "WEB",
"url": "https://github.com/netplex/json-smart-v2/issues/236"
},
{
"type": "WEB",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"type": "PACKAGE",
"url": "https://github.com/netplex/json-smart-v2"
},
{
"type": "WEB",
"url": "https://github.com/netplex/json-smart-v2/releases/tag/2.5.2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Netplex Json-smart Uncontrolled Recursion vulnerability"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.