Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-21758 (GCVE-0-2025-21758)
Vulnerability from cvelistv5
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux | Version: b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 Version: b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 Version: b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 Version: b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 Version: b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 Version: b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551 | ||
{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/ipv6/mcast.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "29fa42197f26a97cde29fa8c40beddf44ea5c8f3",
              "status": "affected",
              "version": "b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551",
              "versionType": "git"
            },
            {
              "lessThan": "e8af3632a7f2da83e27b083f787bced1faba00b1",
              "status": "affected",
              "version": "b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551",
              "versionType": "git"
            },
            {
              "lessThan": "1b91c597b0214b1b462eb627ec02658c944623f2",
              "status": "affected",
              "version": "b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551",
              "versionType": "git"
            },
            {
              "lessThan": "25195f9d5ffcc8079ad743a50c0409dbdc48d98a",
              "status": "affected",
              "version": "b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551",
              "versionType": "git"
            },
            {
              "lessThan": "d60d493b0e65647e0335e6a7c4547abcea7df8e9",
              "status": "affected",
              "version": "b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551",
              "versionType": "git"
            },
            {
              "lessThan": "a527750d877fd334de87eef81f1cb5f0f0ca3373",
              "status": "affected",
              "version": "b8ad0cbc58f703972e9e37c4e2a8081dd7e6a551",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/ipv6/mcast.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.26"
            },
            {
              "lessThan": "2.6.26",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.179",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.129",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.79",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.13.*",
              "status": "unaffected",
              "version": "6.13.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.14",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.179",
                  "versionStartIncluding": "2.6.26",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.129",
                  "versionStartIncluding": "2.6.26",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.79",
                  "versionStartIncluding": "2.6.26",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.16",
                  "versionStartIncluding": "2.6.26",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13.4",
                  "versionStartIncluding": "2.6.26",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14",
                  "versionStartIncluding": "2.6.26",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: mcast: add RCU protection to mld_newpack()\n\nmld_newpack() can be called without RTNL or RCU being held.\n\nNote that we no longer can use sock_alloc_send_skb() because\nipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.\n\nInstead use alloc_skb() and charge the net-\u003eipv6.igmp_sk\nsocket under RCU protection."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:20:29.913Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3"
        },
        {
          "url": "https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1"
        },
        {
          "url": "https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2"
        },
        {
          "url": "https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a"
        },
        {
          "url": "https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9"
        },
        {
          "url": "https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373"
        }
      ],
      "title": "ipv6: mcast: add RCU protection to mld_newpack()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-21758",
    "datePublished": "2025-02-27T02:18:12.496Z",
    "dateReserved": "2024-12-29T08:45:45.761Z",
    "dateUpdated": "2025-05-04T07:20:29.913Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-21758\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-27T03:15:16.450\",\"lastModified\":\"2025-10-28T20:50:15.913\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nipv6: mcast: add RCU protection to mld_newpack()\\n\\nmld_newpack() can be called without RTNL or RCU being held.\\n\\nNote that we no longer can use sock_alloc_send_skb() because\\nipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.\\n\\nInstead use alloc_skb() and charge the net-\u003eipv6.igmp_sk\\nsocket under RCU protection.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: mcast: agregar protecci\u00f3n RCU a mld_newpack() mld_newpack() se puede llamar sin que se mantenga RTNL o RCU. Tenga en cuenta que ya no podemos usar sock_alloc_send_skb() porque ipv6.igmp_sk usa asignaciones GFP_KERNEL que pueden dormir. En su lugar, use alloc_skb() y cargue el socket net-\u0026gt;ipv6.igmp_sk bajo la protecci\u00f3n RCU.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.26\",\"versionEndExcluding\":\"5.15.179\",\"matchCriteriaId\":\"6F480B9F-DE53-45AC-B511-DB94780AEC99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.129\",\"matchCriteriaId\":\"2DA5009C-C9B9-4A1D-9B96-78427E8F232C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.79\",\"matchCriteriaId\":\"B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.16\",\"matchCriteriaId\":\"13C8DB18-FC60-425F-84E5-3EDDEC61B2FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.13\",\"versionEndExcluding\":\"6.13.4\",\"matchCriteriaId\":\"2A2093ED-74A9-43F9-AC72-50030F374EA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"186716B6-2B66-4BD0-852E-D48E71C0C85F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3E781C-403A-498F-9DA9-ECEE50F41E75\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}
  CERTFR-2025-AVI-0559
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 16.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 20.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 24.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 25.04",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 24.10",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 14.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 22.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
    },
    {
      "name": "CVE-2024-26982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
    },
    {
      "name": "CVE-2021-47211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47211"
    },
    {
      "name": "CVE-2021-47260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47260"
    },
    {
      "name": "CVE-2023-52664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52664"
    },
    {
      "name": "CVE-2021-47576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
    },
    {
      "name": "CVE-2024-36945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
    },
    {
      "name": "CVE-2024-42230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
    },
    {
      "name": "CVE-2024-46812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
    },
    {
      "name": "CVE-2024-46821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
    },
    {
      "name": "CVE-2024-46753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2024-49958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2024-50116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50116"
    },
    {
      "name": "CVE-2024-50157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2024-53144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
    },
    {
      "name": "CVE-2024-8805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
    },
    {
      "name": "CVE-2024-53222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
    },
    {
      "name": "CVE-2024-56551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56551"
    },
    {
      "name": "CVE-2024-56599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56599"
    },
    {
      "name": "CVE-2024-53168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53168"
    },
    {
      "name": "CVE-2024-53197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
    },
    {
      "name": "CVE-2024-56664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
    },
    {
      "name": "CVE-2024-56608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56608"
    },
    {
      "name": "CVE-2025-21666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
    },
    {
      "name": "CVE-2025-21669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
    },
    {
      "name": "CVE-2025-21670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
    },
    {
      "name": "CVE-2025-21674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
    },
    {
      "name": "CVE-2025-21675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
    },
    {
      "name": "CVE-2025-21676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
    },
    {
      "name": "CVE-2025-21678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
    },
    {
      "name": "CVE-2025-21682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
    },
    {
      "name": "CVE-2024-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
    },
    {
      "name": "CVE-2024-57948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
    },
    {
      "name": "CVE-2025-21647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
    },
    {
      "name": "CVE-2025-21665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
    },
    {
      "name": "CVE-2025-21667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
    },
    {
      "name": "CVE-2025-21668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
    },
    {
      "name": "CVE-2025-21680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
    },
    {
      "name": "CVE-2025-21681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
    },
    {
      "name": "CVE-2025-21683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
    },
    {
      "name": "CVE-2025-21673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
    },
    {
      "name": "CVE-2024-47726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47726"
    },
    {
      "name": "CVE-2024-56721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56721"
    },
    {
      "name": "CVE-2025-21684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
    },
    {
      "name": "CVE-2025-21689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
    },
    {
      "name": "CVE-2025-21690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
    },
    {
      "name": "CVE-2025-21692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
    },
    {
      "name": "CVE-2025-21697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
    },
    {
      "name": "CVE-2025-21699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
    },
    {
      "name": "CVE-2024-57949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
    },
    {
      "name": "CVE-2024-57951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
    },
    {
      "name": "CVE-2025-21694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
    },
    {
      "name": "CVE-2024-57979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
    },
    {
      "name": "CVE-2025-21715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
    },
    {
      "name": "CVE-2025-21719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
    },
    {
      "name": "CVE-2025-21802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
    },
    {
      "name": "CVE-2024-58014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
    },
    {
      "name": "CVE-2025-21718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-57924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2024-57973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
    },
    {
      "name": "CVE-2024-57978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57978"
    },
    {
      "name": "CVE-2024-57980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
    },
    {
      "name": "CVE-2024-57981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
    },
    {
      "name": "CVE-2024-57986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2024-58007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
    },
    {
      "name": "CVE-2024-58010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
    },
    {
      "name": "CVE-2024-58016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
    },
    {
      "name": "CVE-2024-58017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2024-58034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
    },
    {
      "name": "CVE-2024-58051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
    },
    {
      "name": "CVE-2024-58052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
    },
    {
      "name": "CVE-2024-58055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
    },
    {
      "name": "CVE-2024-58058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
    },
    {
      "name": "CVE-2024-58063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
    },
    {
      "name": "CVE-2024-58069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-58072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
    },
    {
      "name": "CVE-2024-58076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2024-58085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
    },
    {
      "name": "CVE-2025-21711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
    },
    {
      "name": "CVE-2025-21722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
    },
    {
      "name": "CVE-2025-21726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
    },
    {
      "name": "CVE-2025-21727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
    },
    {
      "name": "CVE-2025-21731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
    },
    {
      "name": "CVE-2025-21735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
    },
    {
      "name": "CVE-2025-21736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
    },
    {
      "name": "CVE-2025-21744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
    },
    {
      "name": "CVE-2025-21749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
    },
    {
      "name": "CVE-2025-21814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
    },
    {
      "name": "CVE-2025-21820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
    },
    {
      "name": "CVE-2025-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2024-58002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2024-58079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
    },
    {
      "name": "CVE-2025-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2024-58090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
    },
    {
      "name": "CVE-2025-21721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
    },
    {
      "name": "CVE-2025-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2025-21898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
    },
    {
      "name": "CVE-2025-21909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
    },
    {
      "name": "CVE-2025-21910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
    },
    {
      "name": "CVE-2025-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
    },
    {
      "name": "CVE-2025-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
    },
    {
      "name": "CVE-2025-21914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
    },
    {
      "name": "CVE-2025-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
    },
    {
      "name": "CVE-2025-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
    },
    {
      "name": "CVE-2025-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
    },
    {
      "name": "CVE-2025-21919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
    },
    {
      "name": "CVE-2025-21920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
    },
    {
      "name": "CVE-2025-21922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
    },
    {
      "name": "CVE-2025-21924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
    },
    {
      "name": "CVE-2025-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
    },
    {
      "name": "CVE-2025-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
    },
    {
      "name": "CVE-2025-21936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
    },
    {
      "name": "CVE-2025-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
    },
    {
      "name": "CVE-2025-21944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
    },
    {
      "name": "CVE-2025-21945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
    },
    {
      "name": "CVE-2025-21947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
    },
    {
      "name": "CVE-2025-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
    },
    {
      "name": "CVE-2025-21950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
    },
    {
      "name": "CVE-2025-21951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
    },
    {
      "name": "CVE-2025-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
    },
    {
      "name": "CVE-2025-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
    },
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
    },
    {
      "name": "CVE-2025-21994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2025-21969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
    },
    {
      "name": "CVE-2024-57952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
    },
    {
      "name": "CVE-2025-21672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
    },
    {
      "name": "CVE-2025-21691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-21927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
    },
    {
      "name": "CVE-2025-22035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
    },
    {
      "name": "CVE-2025-22038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
    },
    {
      "name": "CVE-2025-22040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
    },
    {
      "name": "CVE-2025-22041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
    },
    {
      "name": "CVE-2025-22042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
    },
    {
      "name": "CVE-2025-22071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
    },
    {
      "name": "CVE-2025-22072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
    },
    {
      "name": "CVE-2025-22073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
    },
    {
      "name": "CVE-2025-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
    },
    {
      "name": "CVE-2025-22089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
    },
    {
      "name": "CVE-2025-22093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
    },
    {
      "name": "CVE-2025-22095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22095"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-22126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2025-21902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21902"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2024-58094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
    },
    {
      "name": "CVE-2024-58095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
    },
    {
      "name": "CVE-2024-58096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
    },
    {
      "name": "CVE-2024-58097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
    },
    {
      "name": "CVE-2025-21894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
    },
    {
      "name": "CVE-2025-21906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
    },
    {
      "name": "CVE-2025-21908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
    },
    {
      "name": "CVE-2025-21915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
    },
    {
      "name": "CVE-2025-21923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21923"
    },
    {
      "name": "CVE-2025-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
    },
    {
      "name": "CVE-2025-21961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
    },
    {
      "name": "CVE-2025-21966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
    },
    {
      "name": "CVE-2025-21972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
    },
    {
      "name": "CVE-2025-21995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
    },
    {
      "name": "CVE-2025-22001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
    },
    {
      "name": "CVE-2025-22003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
    },
    {
      "name": "CVE-2025-22009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
    },
    {
      "name": "CVE-2025-22013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
    },
    {
      "name": "CVE-2025-22016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
    },
    {
      "name": "CVE-2025-22017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22036"
    },
    {
      "name": "CVE-2025-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-22064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22064"
    },
    {
      "name": "CVE-2025-22065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22065"
    },
    {
      "name": "CVE-2025-22080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22080"
    },
    {
      "name": "CVE-2025-22090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
    },
    {
      "name": "CVE-2025-22102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
    },
    {
      "name": "CVE-2025-22104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
    },
    {
      "name": "CVE-2025-22105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
    },
    {
      "name": "CVE-2025-22106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
    },
    {
      "name": "CVE-2025-22107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
    },
    {
      "name": "CVE-2025-22108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22108"
    },
    {
      "name": "CVE-2025-22109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
    },
    {
      "name": "CVE-2025-22115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
    },
    {
      "name": "CVE-2025-22116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
    },
    {
      "name": "CVE-2025-22121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
    },
    {
      "name": "CVE-2025-22128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
    },
    {
      "name": "CVE-2025-23129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
    },
    {
      "name": "CVE-2025-23131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
    },
    {
      "name": "CVE-2025-23133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2025-37860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
    },
    {
      "name": "CVE-2025-37752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
    },
    {
      "name": "CVE-2025-37778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-37820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
    },
    {
      "name": "CVE-2025-37854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-37889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
    },
    {
      "name": "CVE-2025-37938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2022-49909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49909"
    },
    {
      "name": "CVE-2025-22030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22030"
    },
    {
      "name": "CVE-2025-22057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
    },
    {
      "name": "CVE-2025-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22070"
    },
    {
      "name": "CVE-2025-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
    },
    {
      "name": "CVE-2025-22125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
    },
    {
      "name": "CVE-2025-23160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
    },
    {
      "name": "CVE-2025-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
    },
    {
      "name": "CVE-2025-37755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
    },
    {
      "name": "CVE-2025-37809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
    },
    {
      "name": "CVE-2025-37831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
    },
    {
      "name": "CVE-2025-37833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
    },
    {
      "name": "CVE-2025-37842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
    },
    {
      "name": "CVE-2025-37870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
    },
    {
      "name": "CVE-2025-37886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
    },
    {
      "name": "CVE-2025-37887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
    },
    {
      "name": "CVE-2025-40325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
    },
    {
      "name": "CVE-2025-37943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
    },
    {
      "name": "CVE-2025-21893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21893"
    },
    {
      "name": "CVE-2025-21929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
    },
    {
      "name": "CVE-2025-21973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21973"
    },
    {
      "name": "CVE-2025-21974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
    },
    {
      "name": "CVE-2025-21989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21989"
    },
    {
      "name": "CVE-2025-21990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21990"
    },
    {
      "name": "CVE-2025-22028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
    },
    {
      "name": "CVE-2025-22085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22085"
    },
    {
      "name": "CVE-2025-22091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22091"
    },
    {
      "name": "CVE-2025-22094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22094"
    },
    {
      "name": "CVE-2025-22112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22112"
    },
    {
      "name": "CVE-2025-22113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
    },
    {
      "name": "CVE-2025-22117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22117"
    },
    {
      "name": "CVE-2025-22118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22118"
    },
    {
      "name": "CVE-2025-22119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22119"
    },
    {
      "name": "CVE-2025-22124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
    },
    {
      "name": "CVE-2025-23134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23134"
    },
    {
      "name": "CVE-2025-23149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
    },
    {
      "name": "CVE-2025-23154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23154"
    },
    {
      "name": "CVE-2025-23155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
    },
    {
      "name": "CVE-2025-37743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
    },
    {
      "name": "CVE-2025-37747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
    },
    {
      "name": "CVE-2025-37754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
    },
    {
      "name": "CVE-2025-37793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
    },
    {
      "name": "CVE-2025-37800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
    },
    {
      "name": "CVE-2025-37846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
    },
    {
      "name": "CVE-2025-37853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
    },
    {
      "name": "CVE-2025-37873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
    },
    {
      "name": "CVE-2025-37874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
    },
    {
      "name": "CVE-2025-37925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
    },
    {
      "name": "CVE-2025-37944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
    },
    {
      "name": "CVE-2025-37978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
    },
    {
      "name": "CVE-2025-37980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
    },
    {
      "name": "CVE-2025-37986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
    },
    {
      "name": "CVE-2025-37987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
    },
    {
      "name": "CVE-2025-38104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
    },
    {
      "name": "CVE-2025-38240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38240"
    },
    {
      "name": "CVE-2025-40014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40014"
    },
    {
      "name": "CVE-2022-49636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2024-58092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58092"
    },
    {
      "name": "CVE-2025-21903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
    },
    {
      "name": "CVE-2025-21911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
    },
    {
      "name": "CVE-2025-21939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
    },
    {
      "name": "CVE-2025-21946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
    },
    {
      "name": "CVE-2025-21955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
    },
    {
      "name": "CVE-2025-21967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
    },
    {
      "name": "CVE-2025-21977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
    },
    {
      "name": "CVE-2025-21982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
    },
    {
      "name": "CVE-2025-21984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21984"
    },
    {
      "name": "CVE-2025-21998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21998"
    },
    {
      "name": "CVE-2025-22000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22000"
    },
    {
      "name": "CVE-2025-22002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22002"
    },
    {
      "name": "CVE-2025-22011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
    },
    {
      "name": "CVE-2025-22019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
    },
    {
      "name": "CVE-2025-22022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
    },
    {
      "name": "CVE-2025-22023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22023"
    },
    {
      "name": "CVE-2025-22024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22024"
    },
    {
      "name": "CVE-2025-22026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
    },
    {
      "name": "CVE-2025-22031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22031"
    },
    {
      "name": "CVE-2025-22032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22032"
    },
    {
      "name": "CVE-2025-22034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22034"
    },
    {
      "name": "CVE-2025-22037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
    },
    {
      "name": "CVE-2025-22039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
    },
    {
      "name": "CVE-2025-22043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
    },
    {
      "name": "CVE-2025-22046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22046"
    },
    {
      "name": "CVE-2025-22047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
    },
    {
      "name": "CVE-2025-22051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22051"
    },
    {
      "name": "CVE-2025-22052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22052"
    },
    {
      "name": "CVE-2025-22059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22059"
    },
    {
      "name": "CVE-2025-22061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22061"
    },
    {
      "name": "CVE-2025-22067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22067"
    },
    {
      "name": "CVE-2025-22068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22068"
    },
    {
      "name": "CVE-2025-22069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22069"
    },
    {
      "name": "CVE-2025-22074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22074"
    },
    {
      "name": "CVE-2025-22076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22076"
    },
    {
      "name": "CVE-2025-22078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22078"
    },
    {
      "name": "CVE-2025-22082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22082"
    },
    {
      "name": "CVE-2025-22083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
    },
    {
      "name": "CVE-2025-22084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22084"
    },
    {
      "name": "CVE-2025-22087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22087"
    },
    {
      "name": "CVE-2025-22092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22092"
    },
    {
      "name": "CVE-2025-22096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22096"
    },
    {
      "name": "CVE-2025-22098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22098"
    },
    {
      "name": "CVE-2025-22099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22099"
    },
    {
      "name": "CVE-2025-22100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22100"
    },
    {
      "name": "CVE-2025-22101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
    },
    {
      "name": "CVE-2025-22110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22110"
    },
    {
      "name": "CVE-2025-22111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
    },
    {
      "name": "CVE-2025-22114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22114"
    },
    {
      "name": "CVE-2025-22120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
    },
    {
      "name": "CVE-2025-22122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22122"
    },
    {
      "name": "CVE-2025-22123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22123"
    },
    {
      "name": "CVE-2025-22127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
    },
    {
      "name": "CVE-2025-23130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
    },
    {
      "name": "CVE-2025-23132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
    },
    {
      "name": "CVE-2025-23135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23135"
    },
    {
      "name": "CVE-2025-23137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23137"
    },
    {
      "name": "CVE-2025-23143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
    },
    {
      "name": "CVE-2025-23152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23152"
    },
    {
      "name": "CVE-2025-23153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23153"
    },
    {
      "name": "CVE-2025-23162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
    },
    {
      "name": "CVE-2025-37744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
    },
    {
      "name": "CVE-2025-37745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
    },
    {
      "name": "CVE-2025-37746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
    },
    {
      "name": "CVE-2025-37751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37751"
    },
    {
      "name": "CVE-2025-37759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
    },
    {
      "name": "CVE-2025-37760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37760"
    },
    {
      "name": "CVE-2025-37761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
    },
    {
      "name": "CVE-2025-37762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37762"
    },
    {
      "name": "CVE-2025-37763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
    },
    {
      "name": "CVE-2025-37764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
    },
    {
      "name": "CVE-2025-37774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37774"
    },
    {
      "name": "CVE-2025-37776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
    },
    {
      "name": "CVE-2025-37777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
    },
    {
      "name": "CVE-2025-37779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37779"
    },
    {
      "name": "CVE-2025-37783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37783"
    },
    {
      "name": "CVE-2025-37784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
    },
    {
      "name": "CVE-2025-37786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
    },
    {
      "name": "CVE-2025-37791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37791"
    },
    {
      "name": "CVE-2025-37802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37802"
    },
    {
      "name": "CVE-2025-37806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
    },
    {
      "name": "CVE-2025-37807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
    },
    {
      "name": "CVE-2025-37813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
    },
    {
      "name": "CVE-2025-37814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37814"
    },
    {
      "name": "CVE-2025-37816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
    },
    {
      "name": "CVE-2025-37821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37821"
    },
    {
      "name": "CVE-2025-37822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
    },
    {
      "name": "CVE-2025-37825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37825"
    },
    {
      "name": "CVE-2025-37826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
    },
    {
      "name": "CVE-2025-37827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
    },
    {
      "name": "CVE-2025-37828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
    },
    {
      "name": "CVE-2025-37834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
    },
    {
      "name": "CVE-2025-37837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37837"
    },
    {
      "name": "CVE-2025-37843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37843"
    },
    {
      "name": "CVE-2025-37845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37845"
    },
    {
      "name": "CVE-2025-37847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37847"
    },
    {
      "name": "CVE-2025-37848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37848"
    },
    {
      "name": "CVE-2025-37855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
    },
    {
      "name": "CVE-2025-37856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
    },
    {
      "name": "CVE-2025-37861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
    },
    {
      "name": "CVE-2025-37863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
    },
    {
      "name": "CVE-2025-37864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
    },
    {
      "name": "CVE-2025-37866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37866"
    },
    {
      "name": "CVE-2025-37868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37868"
    },
    {
      "name": "CVE-2025-37869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
    },
    {
      "name": "CVE-2025-37872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
    },
    {
      "name": "CVE-2025-37876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
    },
    {
      "name": "CVE-2025-37877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
    },
    {
      "name": "CVE-2025-37878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
    },
    {
      "name": "CVE-2025-37880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
    },
    {
      "name": "CVE-2025-37882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
    },
    {
      "name": "CVE-2025-37888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37888"
    },
    {
      "name": "CVE-2025-37939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37939"
    },
    {
      "name": "CVE-2025-37941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37941"
    },
    {
      "name": "CVE-2025-37942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37942"
    },
    {
      "name": "CVE-2025-37945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
    },
    {
      "name": "CVE-2025-37975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
    },
    {
      "name": "CVE-2025-37977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
    },
    {
      "name": "CVE-2025-37981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37981"
    },
    {
      "name": "CVE-2025-37984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
    },
    {
      "name": "CVE-2025-37988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
    },
    {
      "name": "CVE-2025-38049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38049"
    },
    {
      "name": "CVE-2025-38479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38479"
    },
    {
      "name": "CVE-2025-39688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39688"
    },
    {
      "name": "CVE-2025-39755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39755"
    },
    {
      "name": "CVE-2025-39778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39778"
    },
    {
      "name": "CVE-2025-39930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39930"
    },
    {
      "name": "CVE-2025-39989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
    },
    {
      "name": "CVE-2025-40114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40114"
    }
  ],
  "initial_release_date": "2025-07-04T00:00:00",
  "last_revision_date": "2025-07-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0559",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": "2025-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7607-2",
      "url": "https://ubuntu.com/security/notices/USN-7607-2"
    },
    {
      "published_at": "2025-06-25",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7595-3",
      "url": "https://ubuntu.com/security/notices/USN-7595-3"
    },
    {
      "published_at": "2025-07-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7585-6",
      "url": "https://ubuntu.com/security/notices/USN-7585-6"
    },
    {
      "published_at": "2025-06-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7605-1",
      "url": "https://ubuntu.com/security/notices/USN-7605-1"
    },
    {
      "published_at": "2025-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7608-3",
      "url": "https://ubuntu.com/security/notices/USN-7608-3"
    },
    {
      "published_at": "2025-06-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7602-1",
      "url": "https://ubuntu.com/security/notices/USN-7602-1"
    },
    {
      "published_at": "2025-06-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7594-2",
      "url": "https://ubuntu.com/security/notices/USN-7594-2"
    },
    {
      "published_at": "2025-06-25",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7596-2",
      "url": "https://ubuntu.com/security/notices/USN-7596-2"
    },
    {
      "published_at": "2025-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7609-1",
      "url": "https://ubuntu.com/security/notices/USN-7609-1"
    },
    {
      "published_at": "2025-06-25",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7585-4",
      "url": "https://ubuntu.com/security/notices/USN-7585-4"
    },
    {
      "published_at": "2025-07-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7608-4",
      "url": "https://ubuntu.com/security/notices/USN-7608-4"
    },
    {
      "published_at": "2025-06-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7606-1",
      "url": "https://ubuntu.com/security/notices/USN-7606-1"
    },
    {
      "published_at": "2025-06-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7595-4",
      "url": "https://ubuntu.com/security/notices/USN-7595-4"
    },
    {
      "published_at": "2025-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7608-2",
      "url": "https://ubuntu.com/security/notices/USN-7608-2"
    },
    {
      "published_at": "2025-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7607-1",
      "url": "https://ubuntu.com/security/notices/USN-7607-1"
    },
    {
      "published_at": "2025-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7608-1",
      "url": "https://ubuntu.com/security/notices/USN-7608-1"
    },
    {
      "published_at": "2025-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7609-2",
      "url": "https://ubuntu.com/security/notices/USN-7609-2"
    },
    {
      "published_at": "2025-06-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7595-5",
      "url": "https://ubuntu.com/security/notices/USN-7595-5"
    },
    {
      "published_at": "2025-06-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7585-5",
      "url": "https://ubuntu.com/security/notices/USN-7585-5"
    }
  ]
}
  CERTFR-2025-AVI-0277
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.129-1~deb11u1",
      "product": {
        "name": "Debian",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-57981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
    },
    {
      "name": "CVE-2024-42122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
    },
    {
      "name": "CVE-2024-58010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
    },
    {
      "name": "CVE-2024-57973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
    },
    {
      "name": "CVE-2024-56549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
    },
    {
      "name": "CVE-2024-58034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
    },
    {
      "name": "CVE-2024-58069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
    },
    {
      "name": "CVE-2025-21731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
    },
    {
      "name": "CVE-2024-58009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21794"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2024-57980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
    },
    {
      "name": "CVE-2024-58011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
    },
    {
      "name": "CVE-2025-21684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
    },
    {
      "name": "CVE-2024-58061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
    },
    {
      "name": "CVE-2024-58058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
    },
    {
      "name": "CVE-2024-58056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
    },
    {
      "name": "CVE-2025-21725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
    },
    {
      "name": "CVE-2025-21727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
    },
    {
      "name": "CVE-2025-21735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
    },
    {
      "name": "CVE-2024-58063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2025-21715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2024-58054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2024-58007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2024-58085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2024-58013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2024-58017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2024-26596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26596"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-21736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
    },
    {
      "name": "CVE-2024-58076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
    },
    {
      "name": "CVE-2025-21708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
    },
    {
      "name": "CVE-2025-21819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
    },
    {
      "name": "CVE-2025-21711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
    },
    {
      "name": "CVE-2025-21799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
    },
    {
      "name": "CVE-2025-21748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2024-58051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2024-45001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
    },
    {
      "name": "CVE-2025-21719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
    },
    {
      "name": "CVE-2025-21718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
    },
    {
      "name": "CVE-2025-21820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
    },
    {
      "name": "CVE-2024-57979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-57997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2025-21826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
    },
    {
      "name": "CVE-2025-21750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
    },
    {
      "name": "CVE-2024-58016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
    },
    {
      "name": "CVE-2024-49989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2025-21802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
    },
    {
      "name": "CVE-2025-21705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
    },
    {
      "name": "CVE-2024-47726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47726"
    },
    {
      "name": "CVE-2024-50061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50061"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2024-40945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40945"
    },
    {
      "name": "CVE-2024-58052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2025-21724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
    },
    {
      "name": "CVE-2025-21701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2024-58077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
    },
    {
      "name": "CVE-2024-42069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42069"
    },
    {
      "name": "CVE-2025-21749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
    },
    {
      "name": "CVE-2025-21829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
    },
    {
      "name": "CVE-2024-58072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
    },
    {
      "name": "CVE-2025-21722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
    },
    {
      "name": "CVE-2024-57978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57978"
    },
    {
      "name": "CVE-2025-21703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21703"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2024-58055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
    },
    {
      "name": "CVE-2024-57993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
    },
    {
      "name": "CVE-2025-21700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21700"
    },
    {
      "name": "CVE-2025-21832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2024-58014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
    },
    {
      "name": "CVE-2025-21716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
    },
    {
      "name": "CVE-2024-58080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
    },
    {
      "name": "CVE-2025-21744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
    },
    {
      "name": "CVE-2024-57986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2025-21811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
    }
  ],
  "initial_release_date": "2025-04-04T00:00:00",
  "last_revision_date": "2025-04-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0277",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
  "vendor_advisories": [
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4102-1",
      "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
    }
  ]
}
  CERTFR-2025-AVI-0509
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | Confidential Computing Module | Confidential Computing Module 15-SP6 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Confidential Computing Module 15-SP6",
      "product": {
        "name": "Confidential Computing Module",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.5",
      "product": {
        "name": "openSUSE Leap",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.3",
      "product": {
        "name": "openSUSE Leap",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.4",
      "product": {
        "name": "openSUSE Leap",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP6",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.2",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.1",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.4",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.6",
      "product": {
        "name": "openSUSE Leap",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.3",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.3",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP6",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP4",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP3",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.5",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP6",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro 6.0",
      "product": {
        "name": "SUSE Linux Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.4",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
    },
    {
      "name": "CVE-2022-3619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
    },
    {
      "name": "CVE-2022-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
    },
    {
      "name": "CVE-2023-1990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
    },
    {
      "name": "CVE-2024-27018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27018"
    },
    {
      "name": "CVE-2024-26634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26634"
    },
    {
      "name": "CVE-2024-35910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
    },
    {
      "name": "CVE-2024-26873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26873"
    },
    {
      "name": "CVE-2024-27415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27415"
    },
    {
      "name": "CVE-2024-35826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
    },
    {
      "name": "CVE-2024-41005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
    },
    {
      "name": "CVE-2024-38606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
    },
    {
      "name": "CVE-2024-41077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
    },
    {
      "name": "CVE-2024-46713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
    },
    {
      "name": "CVE-2024-46763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
    },
    {
      "name": "CVE-2024-46782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
    },
    {
      "name": "CVE-2024-46865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
    },
    {
      "name": "CVE-2024-43869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
    },
    {
      "name": "CVE-2024-49855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
    },
    {
      "name": "CVE-2024-50036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50036"
    },
    {
      "name": "CVE-2024-50126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
    },
    {
      "name": "CVE-2024-50290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
    },
    {
      "name": "CVE-2024-53057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
    },
    {
      "name": "CVE-2024-53063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
    },
    {
      "name": "CVE-2024-42307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307"
    },
    {
      "name": "CVE-2024-43820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
    },
    {
      "name": "CVE-2024-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
    },
    {
      "name": "CVE-2024-50038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
    },
    {
      "name": "CVE-2024-50083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
    },
    {
      "name": "CVE-2024-50162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
    },
    {
      "name": "CVE-2024-50163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
    },
    {
      "name": "CVE-2024-53135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
    },
    {
      "name": "CVE-2024-53140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
    },
    {
      "name": "CVE-2024-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
    },
    {
      "name": "CVE-2024-53168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53168"
    },
    {
      "name": "CVE-2024-56558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
    },
    {
      "name": "CVE-2024-56641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
    },
    {
      "name": "CVE-2024-49994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
    },
    {
      "name": "CVE-2024-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
    },
    {
      "name": "CVE-2024-56703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
    },
    {
      "name": "CVE-2025-21631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21631"
    },
    {
      "name": "CVE-2025-21648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21648"
    },
    {
      "name": "CVE-2025-21671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
    },
    {
      "name": "CVE-2025-21680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
    },
    {
      "name": "CVE-2025-21683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
    },
    {
      "name": "CVE-2024-53177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
    },
    {
      "name": "CVE-2024-49940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
    },
    {
      "name": "CVE-2024-50029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
    },
    {
      "name": "CVE-2024-50056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
    },
    {
      "name": "CVE-2024-50140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50140"
    },
    {
      "name": "CVE-2024-50152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
    },
    {
      "name": "CVE-2024-50223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
    },
    {
      "name": "CVE-2024-50294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
    },
    {
      "name": "CVE-2024-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53139"
    },
    {
      "name": "CVE-2024-53163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53163"
    },
    {
      "name": "CVE-2024-53176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
    },
    {
      "name": "CVE-2024-53178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
    },
    {
      "name": "CVE-2024-56702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2023-52926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
    },
    {
      "name": "CVE-2024-47408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47408"
    },
    {
      "name": "CVE-2024-49571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49571"
    },
    {
      "name": "CVE-2024-53680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
    },
    {
      "name": "CVE-2024-56640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
    },
    {
      "name": "CVE-2024-56718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
    },
    {
      "name": "CVE-2024-56770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
    },
    {
      "name": "CVE-2024-57807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57807"
    },
    {
      "name": "CVE-2024-57900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57900"
    },
    {
      "name": "CVE-2022-49080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
    },
    {
      "name": "CVE-2024-57979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
    },
    {
      "name": "CVE-2024-57994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
    },
    {
      "name": "CVE-2025-21705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
    },
    {
      "name": "CVE-2025-21715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
    },
    {
      "name": "CVE-2025-21716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
    },
    {
      "name": "CVE-2025-21719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
    },
    {
      "name": "CVE-2025-21724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
    },
    {
      "name": "CVE-2025-21725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2025-21754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
    },
    {
      "name": "CVE-2025-21802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
    },
    {
      "name": "CVE-2022-49563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49563"
    },
    {
      "name": "CVE-2022-49564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49564"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2024-58014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
    },
    {
      "name": "CVE-2025-21718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-47794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
    },
    {
      "name": "CVE-2024-54683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
    },
    {
      "name": "CVE-2024-56638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
    },
    {
      "name": "CVE-2024-56719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
    },
    {
      "name": "CVE-2024-56758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56758"
    },
    {
      "name": "CVE-2024-57924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
    },
    {
      "name": "CVE-2025-21635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
    },
    {
      "name": "CVE-2025-21659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2024-57973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
    },
    {
      "name": "CVE-2024-57978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57978"
    },
    {
      "name": "CVE-2024-57980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
    },
    {
      "name": "CVE-2024-57981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
    },
    {
      "name": "CVE-2024-57986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
    },
    {
      "name": "CVE-2024-57993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
    },
    {
      "name": "CVE-2024-57997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2024-58007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
    },
    {
      "name": "CVE-2024-58009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
    },
    {
      "name": "CVE-2024-58011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
    },
    {
      "name": "CVE-2024-58013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
    },
    {
      "name": "CVE-2024-58017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2024-58034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
    },
    {
      "name": "CVE-2024-58051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
    },
    {
      "name": "CVE-2024-58052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
    },
    {
      "name": "CVE-2024-58054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
    },
    {
      "name": "CVE-2024-58055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
    },
    {
      "name": "CVE-2024-58056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
    },
    {
      "name": "CVE-2024-58058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
    },
    {
      "name": "CVE-2024-58061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
    },
    {
      "name": "CVE-2024-58063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-58069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-58072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
    },
    {
      "name": "CVE-2024-58076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
    },
    {
      "name": "CVE-2024-58080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2024-58085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-21701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
    },
    {
      "name": "CVE-2025-21703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21703"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
    },
    {
      "name": "CVE-2025-21711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
    },
    {
      "name": "CVE-2025-21726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
    },
    {
      "name": "CVE-2025-21727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
    },
    {
      "name": "CVE-2025-21731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
    },
    {
      "name": "CVE-2025-21734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
    },
    {
      "name": "CVE-2025-21735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
    },
    {
      "name": "CVE-2025-21736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
    },
    {
      "name": "CVE-2025-21738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
    },
    {
      "name": "CVE-2025-21744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
    },
    {
      "name": "CVE-2025-21750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-21794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21794"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2025-21814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
    },
    {
      "name": "CVE-2025-21819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
    },
    {
      "name": "CVE-2025-21820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
    },
    {
      "name": "CVE-2025-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
    },
    {
      "name": "CVE-2025-21832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2022-49139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
    },
    {
      "name": "CVE-2023-52831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2024-41149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41149"
    },
    {
      "name": "CVE-2024-46736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
    },
    {
      "name": "CVE-2024-46796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2024-57947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57947"
    },
    {
      "name": "CVE-2024-57974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
    },
    {
      "name": "CVE-2024-57990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
    },
    {
      "name": "CVE-2024-57999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
    },
    {
      "name": "CVE-2024-58002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2024-58006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
    },
    {
      "name": "CVE-2024-58012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
    },
    {
      "name": "CVE-2024-58019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
    },
    {
      "name": "CVE-2024-58057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
    },
    {
      "name": "CVE-2024-58078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
    },
    {
      "name": "CVE-2024-58079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
    },
    {
      "name": "CVE-2025-21693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
    },
    {
      "name": "CVE-2025-21714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
    },
    {
      "name": "CVE-2025-21723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
    },
    {
      "name": "CVE-2025-21732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
    },
    {
      "name": "CVE-2025-21739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
    },
    {
      "name": "CVE-2025-21741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
    },
    {
      "name": "CVE-2025-21742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
    },
    {
      "name": "CVE-2025-21743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
    },
    {
      "name": "CVE-2025-21756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2025-21773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
    },
    {
      "name": "CVE-2025-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
    },
    {
      "name": "CVE-2025-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
    },
    {
      "name": "CVE-2025-21810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
    },
    {
      "name": "CVE-2025-21815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
    },
    {
      "name": "CVE-2025-21825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
    },
    {
      "name": "CVE-2025-21828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
    },
    {
      "name": "CVE-2025-21831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-21850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21850"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
    },
    {
      "name": "CVE-2025-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
    },
    {
      "name": "CVE-2025-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
    },
    {
      "name": "CVE-2025-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
    },
    {
      "name": "CVE-2025-21885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
    },
    {
      "name": "CVE-2025-21886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
    },
    {
      "name": "CVE-2025-21888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
    },
    {
      "name": "CVE-2025-21890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
    },
    {
      "name": "CVE-2025-21891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
    },
    {
      "name": "CVE-2025-21892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
    },
    {
      "name": "CVE-2025-21702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
    },
    {
      "name": "CVE-2025-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
    },
    {
      "name": "CVE-2025-21909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
    },
    {
      "name": "CVE-2025-21910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
    },
    {
      "name": "CVE-2025-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
    },
    {
      "name": "CVE-2025-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
    },
    {
      "name": "CVE-2025-21914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
    },
    {
      "name": "CVE-2025-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
    },
    {
      "name": "CVE-2025-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
    },
    {
      "name": "CVE-2025-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
    },
    {
      "name": "CVE-2025-21919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
    },
    {
      "name": "CVE-2025-21922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
    },
    {
      "name": "CVE-2025-21924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
    },
    {
      "name": "CVE-2025-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
    },
    {
      "name": "CVE-2025-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
    },
    {
      "name": "CVE-2025-21936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
    },
    {
      "name": "CVE-2025-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
    },
    {
      "name": "CVE-2025-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
    },
    {
      "name": "CVE-2025-21950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
    },
    {
      "name": "CVE-2025-21951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
    },
    {
      "name": "CVE-2025-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
    },
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2025-21969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
    },
    {
      "name": "CVE-2025-21696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-21927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
    },
    {
      "name": "CVE-2025-22093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-22126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2024-28956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
    },
    {
      "name": "CVE-2025-21953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
    },
    {
      "name": "CVE-2022-49110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49110"
    },
    {
      "name": "CVE-2022-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49767"
    },
    {
      "name": "CVE-2023-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53051"
    },
    {
      "name": "CVE-2024-35840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35840"
    },
    {
      "name": "CVE-2024-58018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
    },
    {
      "name": "CVE-2024-58070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2024-58094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
    },
    {
      "name": "CVE-2024-58095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
    },
    {
      "name": "CVE-2024-58096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
    },
    {
      "name": "CVE-2024-58097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
    },
    {
      "name": "CVE-2025-21729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21729"
    },
    {
      "name": "CVE-2025-21755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
    },
    {
      "name": "CVE-2025-21833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21852"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
    },
    {
      "name": "CVE-2025-21884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
    },
    {
      "name": "CVE-2025-21889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
    },
    {
      "name": "CVE-2025-21894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
    },
    {
      "name": "CVE-2025-21895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
    },
    {
      "name": "CVE-2025-21906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
    },
    {
      "name": "CVE-2025-21908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
    },
    {
      "name": "CVE-2025-21915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
    },
    {
      "name": "CVE-2025-21923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21923"
    },
    {
      "name": "CVE-2025-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
    },
    {
      "name": "CVE-2025-21931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
    },
    {
      "name": "CVE-2025-21961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
    },
    {
      "name": "CVE-2025-21966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
    },
    {
      "name": "CVE-2025-21972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
    },
    {
      "name": "CVE-2025-21985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
    },
    {
      "name": "CVE-2025-21995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
    },
    {
      "name": "CVE-2025-22001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
    },
    {
      "name": "CVE-2025-22003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
    },
    {
      "name": "CVE-2025-22009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
    },
    {
      "name": "CVE-2025-22013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
    },
    {
      "name": "CVE-2025-22016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
    },
    {
      "name": "CVE-2025-22017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22029"
    },
    {
      "name": "CVE-2025-22036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22036"
    },
    {
      "name": "CVE-2025-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-22064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22064"
    },
    {
      "name": "CVE-2025-22065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22065"
    },
    {
      "name": "CVE-2025-22080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22080"
    },
    {
      "name": "CVE-2025-22090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
    },
    {
      "name": "CVE-2025-22102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
    },
    {
      "name": "CVE-2025-22104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
    },
    {
      "name": "CVE-2025-22105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
    },
    {
      "name": "CVE-2025-22106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
    },
    {
      "name": "CVE-2025-22107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
    },
    {
      "name": "CVE-2025-22108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22108"
    },
    {
      "name": "CVE-2025-22109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
    },
    {
      "name": "CVE-2025-22115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
    },
    {
      "name": "CVE-2025-22116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
    },
    {
      "name": "CVE-2025-22121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
    },
    {
      "name": "CVE-2025-22128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
    },
    {
      "name": "CVE-2025-23129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
    },
    {
      "name": "CVE-2025-23131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
    },
    {
      "name": "CVE-2025-23133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2025-37860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-37748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
    },
    {
      "name": "CVE-2025-37948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
    },
    {
      "name": "CVE-2022-49769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49769"
    },
    {
      "name": "CVE-2022-49770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49770"
    },
    {
      "name": "CVE-2022-49771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49771"
    },
    {
      "name": "CVE-2022-49772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49772"
    },
    {
      "name": "CVE-2022-49775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49775"
    },
    {
      "name": "CVE-2022-49776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49776"
    },
    {
      "name": "CVE-2022-49777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49777"
    },
    {
      "name": "CVE-2022-49779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49779"
    },
    {
      "name": "CVE-2022-49783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
    },
    {
      "name": "CVE-2022-49787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49787"
    },
    {
      "name": "CVE-2022-49788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49788"
    },
    {
      "name": "CVE-2022-49789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49789"
    },
    {
      "name": "CVE-2022-49790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49790"
    },
    {
      "name": "CVE-2022-49792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49792"
    },
    {
      "name": "CVE-2022-49793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49793"
    },
    {
      "name": "CVE-2022-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49794"
    },
    {
      "name": "CVE-2022-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49796"
    },
    {
      "name": "CVE-2022-49797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49797"
    },
    {
      "name": "CVE-2022-49799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49799"
    },
    {
      "name": "CVE-2022-49800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49800"
    },
    {
      "name": "CVE-2022-49801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49801"
    },
    {
      "name": "CVE-2022-49802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49802"
    },
    {
      "name": "CVE-2022-49807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49807"
    },
    {
      "name": "CVE-2022-49809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49809"
    },
    {
      "name": "CVE-2022-49810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
    },
    {
      "name": "CVE-2022-49812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49812"
    },
    {
      "name": "CVE-2022-49813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49813"
    },
    {
      "name": "CVE-2022-49818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49818"
    },
    {
      "name": "CVE-2022-49821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49821"
    },
    {
      "name": "CVE-2022-49822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49822"
    },
    {
      "name": "CVE-2022-49823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49823"
    },
    {
      "name": "CVE-2022-49824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49824"
    },
    {
      "name": "CVE-2022-49825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49825"
    },
    {
      "name": "CVE-2022-49826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49826"
    },
    {
      "name": "CVE-2022-49827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49827"
    },
    {
      "name": "CVE-2022-49830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49830"
    },
    {
      "name": "CVE-2022-49832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49832"
    },
    {
      "name": "CVE-2022-49834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49834"
    },
    {
      "name": "CVE-2022-49835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49835"
    },
    {
      "name": "CVE-2022-49836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49836"
    },
    {
      "name": "CVE-2022-49839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49839"
    },
    {
      "name": "CVE-2022-49841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49841"
    },
    {
      "name": "CVE-2022-49842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49842"
    },
    {
      "name": "CVE-2022-49845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49845"
    },
    {
      "name": "CVE-2022-49846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
    },
    {
      "name": "CVE-2022-49850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49850"
    },
    {
      "name": "CVE-2022-49853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49853"
    },
    {
      "name": "CVE-2022-49858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
    },
    {
      "name": "CVE-2022-49860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49860"
    },
    {
      "name": "CVE-2022-49861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49861"
    },
    {
      "name": "CVE-2022-49863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49863"
    },
    {
      "name": "CVE-2022-49864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49864"
    },
    {
      "name": "CVE-2022-49865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49865"
    },
    {
      "name": "CVE-2022-49868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49868"
    },
    {
      "name": "CVE-2022-49869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49869"
    },
    {
      "name": "CVE-2022-49870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49870"
    },
    {
      "name": "CVE-2022-49871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49871"
    },
    {
      "name": "CVE-2022-49874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49874"
    },
    {
      "name": "CVE-2022-49879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49879"
    },
    {
      "name": "CVE-2022-49880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49880"
    },
    {
      "name": "CVE-2022-49881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49881"
    },
    {
      "name": "CVE-2022-49885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49885"
    },
    {
      "name": "CVE-2022-49887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49887"
    },
    {
      "name": "CVE-2022-49888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49888"
    },
    {
      "name": "CVE-2022-49889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49889"
    },
    {
      "name": "CVE-2022-49890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49890"
    },
    {
      "name": "CVE-2022-49891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49891"
    },
    {
      "name": "CVE-2022-49892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49892"
    },
    {
      "name": "CVE-2022-49900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49900"
    },
    {
      "name": "CVE-2022-49905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49905"
    },
    {
      "name": "CVE-2022-49906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49906"
    },
    {
      "name": "CVE-2022-49908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49908"
    },
    {
      "name": "CVE-2022-49909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49909"
    },
    {
      "name": "CVE-2022-49910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
    },
    {
      "name": "CVE-2022-49915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49915"
    },
    {
      "name": "CVE-2022-49916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49916"
    },
    {
      "name": "CVE-2022-49922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49922"
    },
    {
      "name": "CVE-2022-49923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49923"
    },
    {
      "name": "CVE-2022-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49924"
    },
    {
      "name": "CVE-2022-49925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49925"
    },
    {
      "name": "CVE-2022-49927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49927"
    },
    {
      "name": "CVE-2022-49928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49928"
    },
    {
      "name": "CVE-2022-49931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49931"
    },
    {
      "name": "CVE-2023-53035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53035"
    },
    {
      "name": "CVE-2023-53038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53038"
    },
    {
      "name": "CVE-2023-53039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53039"
    },
    {
      "name": "CVE-2023-53040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53040"
    },
    {
      "name": "CVE-2023-53041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53041"
    },
    {
      "name": "CVE-2023-53044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53044"
    },
    {
      "name": "CVE-2023-53045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53045"
    },
    {
      "name": "CVE-2023-53049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53049"
    },
    {
      "name": "CVE-2023-53052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
    },
    {
      "name": "CVE-2023-53054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53054"
    },
    {
      "name": "CVE-2023-53056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53056"
    },
    {
      "name": "CVE-2023-53058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53058"
    },
    {
      "name": "CVE-2023-53059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53059"
    },
    {
      "name": "CVE-2023-53060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53060"
    },
    {
      "name": "CVE-2023-53062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53062"
    },
    {
      "name": "CVE-2023-53064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53064"
    },
    {
      "name": "CVE-2023-53065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53065"
    },
    {
      "name": "CVE-2023-53066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53066"
    },
    {
      "name": "CVE-2023-53068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
    },
    {
      "name": "CVE-2023-53075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53075"
    },
    {
      "name": "CVE-2023-53077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53077"
    },
    {
      "name": "CVE-2023-53078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53078"
    },
    {
      "name": "CVE-2023-53079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53079"
    },
    {
      "name": "CVE-2023-53081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53081"
    },
    {
      "name": "CVE-2023-53084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53084"
    },
    {
      "name": "CVE-2023-53087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53087"
    },
    {
      "name": "CVE-2023-53089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53089"
    },
    {
      "name": "CVE-2023-53090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53090"
    },
    {
      "name": "CVE-2023-53091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53091"
    },
    {
      "name": "CVE-2023-53092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53092"
    },
    {
      "name": "CVE-2023-53093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
    },
    {
      "name": "CVE-2023-53096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53096"
    },
    {
      "name": "CVE-2023-53098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53098"
    },
    {
      "name": "CVE-2023-53099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53099"
    },
    {
      "name": "CVE-2023-53100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53100"
    },
    {
      "name": "CVE-2023-53101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53101"
    },
    {
      "name": "CVE-2023-53106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53106"
    },
    {
      "name": "CVE-2023-53108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53108"
    },
    {
      "name": "CVE-2023-53111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53111"
    },
    {
      "name": "CVE-2023-53114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53114"
    },
    {
      "name": "CVE-2023-53116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53116"
    },
    {
      "name": "CVE-2023-53118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53118"
    },
    {
      "name": "CVE-2023-53119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53119"
    },
    {
      "name": "CVE-2023-53123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53123"
    },
    {
      "name": "CVE-2023-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53124"
    },
    {
      "name": "CVE-2023-53125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53125"
    },
    {
      "name": "CVE-2023-53131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53131"
    },
    {
      "name": "CVE-2023-53134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53134"
    },
    {
      "name": "CVE-2023-53137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53137"
    },
    {
      "name": "CVE-2023-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53139"
    },
    {
      "name": "CVE-2023-53140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53140"
    },
    {
      "name": "CVE-2023-53142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53142"
    },
    {
      "name": "CVE-2023-53143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53143"
    },
    {
      "name": "CVE-2023-53145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53145"
    },
    {
      "name": "CVE-2025-22030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22030"
    },
    {
      "name": "CVE-2025-22057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
    },
    {
      "name": "CVE-2025-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22070"
    },
    {
      "name": "CVE-2025-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
    },
    {
      "name": "CVE-2025-22125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
    },
    {
      "name": "CVE-2025-23160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
    },
    {
      "name": "CVE-2025-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
    },
    {
      "name": "CVE-2025-37755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
    },
    {
      "name": "CVE-2025-37804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37804"
    },
    {
      "name": "CVE-2025-37809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
    },
    {
      "name": "CVE-2025-37831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
    },
    {
      "name": "CVE-2025-37833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
    },
    {
      "name": "CVE-2025-37842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
    },
    {
      "name": "CVE-2025-37870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
    },
    {
      "name": "CVE-2025-37886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
    },
    {
      "name": "CVE-2025-37887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
    },
    {
      "name": "CVE-2025-37957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
    },
    {
      "name": "CVE-2025-37958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
    },
    {
      "name": "CVE-2025-37960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
    },
    {
      "name": "CVE-2025-37974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
    },
    {
      "name": "CVE-2025-40325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
    }
  ],
  "initial_release_date": "2025-06-13T00:00:00",
  "last_revision_date": "2025-06-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0509",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01901-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501901-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01894-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501894-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01892-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501892-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20387-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520387-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01873-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501873-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01930-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501930-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01932-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501932-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20388-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520388-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01927-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501927-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01908-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501908-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01918-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501918-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01928-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501928-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01843-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501843-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01875-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501875-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01922-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501922-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20382-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520382-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01853-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501853-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01851-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501851-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01929-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501929-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20389-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520389-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01899-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501899-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01840-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501840-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01849-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501849-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01893-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501893-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20383-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520383-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20384-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520384-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20381-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520381-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01844-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501844-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01919-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501919-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01839-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501839-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01935-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501935-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01869-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501869-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01868-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501868-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01907-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501907-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20386-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520386-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01906-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501906-1"
    }
  ]
}
  CERTFR-2025-AVI-0529
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Manager Proxy 4.2 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
| SUSE | N/A | SUSE Linux Micro 6.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Micro 6.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | Public Cloud Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Manager Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Manager Proxy 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro Extras 6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Desktop 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Public Cloud Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Basesystem Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro 6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Real Time Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro 6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Legacy Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Public Cloud Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Desktop 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Legacy Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Retail Branch Server 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Enterprise Storage 7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Development Tools Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Server 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Basesystem Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Development Tools Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Real Time Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    },
    {
      "name": "CVE-2021-3743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
    },
    {
      "name": "CVE-2021-20320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20320"
    },
    {
      "name": "CVE-2022-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
    },
    {
      "name": "CVE-2022-3619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
    },
    {
      "name": "CVE-2022-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
    },
    {
      "name": "CVE-2021-4159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4159"
    },
    {
      "name": "CVE-2023-1074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
    },
    {
      "name": "CVE-2023-28866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28866"
    },
    {
      "name": "CVE-2023-1989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
    },
    {
      "name": "CVE-2023-1990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
    },
    {
      "name": "CVE-2023-6531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6531"
    },
    {
      "name": "CVE-2023-0160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
    },
    {
      "name": "CVE-2023-47233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47233"
    },
    {
      "name": "CVE-2023-52591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
    },
    {
      "name": "CVE-2021-47100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47100"
    },
    {
      "name": "CVE-2023-52508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
    },
    {
      "name": "CVE-2024-26804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
    },
    {
      "name": "CVE-2021-47170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47170"
    },
    {
      "name": "CVE-2024-27018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27018"
    },
    {
      "name": "CVE-2022-48704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
    },
    {
      "name": "CVE-2021-47220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47220"
    },
    {
      "name": "CVE-2021-47229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47229"
    },
    {
      "name": "CVE-2021-47231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47231"
    },
    {
      "name": "CVE-2021-47236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
    },
    {
      "name": "CVE-2021-47239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
    },
    {
      "name": "CVE-2021-47240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47240"
    },
    {
      "name": "CVE-2021-47246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47246"
    },
    {
      "name": "CVE-2021-47252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47252"
    },
    {
      "name": "CVE-2021-47255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47255"
    },
    {
      "name": "CVE-2021-47260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47260"
    },
    {
      "name": "CVE-2021-47288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47288"
    },
    {
      "name": "CVE-2021-47296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47296"
    },
    {
      "name": "CVE-2021-47314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47314"
    },
    {
      "name": "CVE-2021-47315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47315"
    },
    {
      "name": "CVE-2021-47485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47485"
    },
    {
      "name": "CVE-2021-47500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
    },
    {
      "name": "CVE-2021-47511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47511"
    },
    {
      "name": "CVE-2023-52654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
    },
    {
      "name": "CVE-2023-52868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
    },
    {
      "name": "CVE-2024-35811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35811"
    },
    {
      "name": "CVE-2024-35895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35895"
    },
    {
      "name": "CVE-2024-35914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35914"
    },
    {
      "name": "CVE-2024-26740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
    },
    {
      "name": "CVE-2024-35910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
    },
    {
      "name": "CVE-2024-27415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27415"
    },
    {
      "name": "CVE-2024-27010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
    },
    {
      "name": "CVE-2024-41005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
    },
    {
      "name": "CVE-2024-38606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
    },
    {
      "name": "CVE-2022-48875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
    },
    {
      "name": "CVE-2024-45021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
    },
    {
      "name": "CVE-2024-46713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
    },
    {
      "name": "CVE-2024-46752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
    },
    {
      "name": "CVE-2024-46763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
    },
    {
      "name": "CVE-2024-46782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
    },
    {
      "name": "CVE-2024-46814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
    },
    {
      "name": "CVE-2024-46865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2023-52888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
    },
    {
      "name": "CVE-2024-43869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
    },
    {
      "name": "CVE-2024-50126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
    },
    {
      "name": "CVE-2024-50290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
    },
    {
      "name": "CVE-2024-53057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
    },
    {
      "name": "CVE-2024-53063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
    },
    {
      "name": "CVE-2024-43820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
    },
    {
      "name": "CVE-2024-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
    },
    {
      "name": "CVE-2024-50038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
    },
    {
      "name": "CVE-2024-50083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
    },
    {
      "name": "CVE-2024-50162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
    },
    {
      "name": "CVE-2024-50163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
    },
    {
      "name": "CVE-2024-53135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
    },
    {
      "name": "CVE-2024-53140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
    },
    {
      "name": "CVE-2024-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
    },
    {
      "name": "CVE-2024-53168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53168"
    },
    {
      "name": "CVE-2024-56558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
    },
    {
      "name": "CVE-2024-56641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
    },
    {
      "name": "CVE-2024-56705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56705"
    },
    {
      "name": "CVE-2024-56779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56779"
    },
    {
      "name": "CVE-2024-49994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
    },
    {
      "name": "CVE-2024-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
    },
    {
      "name": "CVE-2024-56703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
    },
    {
      "name": "CVE-2025-21648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21648"
    },
    {
      "name": "CVE-2025-21680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
    },
    {
      "name": "CVE-2025-21683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
    },
    {
      "name": "CVE-2024-56633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56633"
    },
    {
      "name": "CVE-2024-50056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
    },
    {
      "name": "CVE-2024-50140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50140"
    },
    {
      "name": "CVE-2024-50223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
    },
    {
      "name": "CVE-2024-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53139"
    },
    {
      "name": "CVE-2024-53163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53163"
    },
    {
      "name": "CVE-2024-56702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2024-47408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47408"
    },
    {
      "name": "CVE-2024-49571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49571"
    },
    {
      "name": "CVE-2024-53680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
    },
    {
      "name": "CVE-2024-56640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
    },
    {
      "name": "CVE-2024-56718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
    },
    {
      "name": "CVE-2024-56770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
    },
    {
      "name": "CVE-2024-57900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57900"
    },
    {
      "name": "CVE-2025-21629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
    },
    {
      "name": "CVE-2022-49080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2022-49145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
    },
    {
      "name": "CVE-2022-49212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49212"
    },
    {
      "name": "CVE-2022-49216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
    },
    {
      "name": "CVE-2022-49235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49235"
    },
    {
      "name": "CVE-2022-49248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49248"
    },
    {
      "name": "CVE-2022-49253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49253"
    },
    {
      "name": "CVE-2022-49320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49320"
    },
    {
      "name": "CVE-2022-49326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49326"
    },
    {
      "name": "CVE-2022-49371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49371"
    },
    {
      "name": "CVE-2022-49382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49382"
    },
    {
      "name": "CVE-2022-49396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49396"
    },
    {
      "name": "CVE-2022-49441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
    },
    {
      "name": "CVE-2022-49445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49445"
    },
    {
      "name": "CVE-2022-49460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49460"
    },
    {
      "name": "CVE-2022-49467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49467"
    },
    {
      "name": "CVE-2022-49474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49474"
    },
    {
      "name": "CVE-2022-49491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49491"
    },
    {
      "name": "CVE-2022-49503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
    },
    {
      "name": "CVE-2022-49563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49563"
    },
    {
      "name": "CVE-2022-49564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49564"
    },
    {
      "name": "CVE-2022-49592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
    },
    {
      "name": "CVE-2022-49625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
    },
    {
      "name": "CVE-2022-49652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49652"
    },
    {
      "name": "CVE-2022-49715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49715"
    },
    {
      "name": "CVE-2022-49729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49729"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2024-47794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
    },
    {
      "name": "CVE-2024-49568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
    },
    {
      "name": "CVE-2024-54683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
    },
    {
      "name": "CVE-2024-56638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
    },
    {
      "name": "CVE-2024-56719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
    },
    {
      "name": "CVE-2024-56758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56758"
    },
    {
      "name": "CVE-2024-57924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
    },
    {
      "name": "CVE-2025-21635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
    },
    {
      "name": "CVE-2025-21659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2024-58013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2025-21701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
    },
    {
      "name": "CVE-2025-21703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21703"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2025-21814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-21832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
    },
    {
      "name": "CVE-2022-49139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
    },
    {
      "name": "CVE-2022-49635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
    },
    {
      "name": "CVE-2022-49751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49751"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2023-52975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52975"
    },
    {
      "name": "CVE-2023-52988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52988"
    },
    {
      "name": "CVE-2023-52989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52989"
    },
    {
      "name": "CVE-2023-52993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
    },
    {
      "name": "CVE-2024-57947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57947"
    },
    {
      "name": "CVE-2024-57974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
    },
    {
      "name": "CVE-2024-58019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
    },
    {
      "name": "CVE-2025-21693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
    },
    {
      "name": "CVE-2025-21739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-21850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21850"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
    },
    {
      "name": "CVE-2025-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
    },
    {
      "name": "CVE-2025-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
    },
    {
      "name": "CVE-2025-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
    },
    {
      "name": "CVE-2025-21885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
    },
    {
      "name": "CVE-2025-21886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
    },
    {
      "name": "CVE-2025-21888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
    },
    {
      "name": "CVE-2025-21890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
    },
    {
      "name": "CVE-2025-21891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
    },
    {
      "name": "CVE-2025-21892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
    },
    {
      "name": "CVE-2025-21702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
    },
    {
      "name": "CVE-2025-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
    },
    {
      "name": "CVE-2025-21909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
    },
    {
      "name": "CVE-2025-21910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
    },
    {
      "name": "CVE-2025-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
    },
    {
      "name": "CVE-2025-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
    },
    {
      "name": "CVE-2025-21914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
    },
    {
      "name": "CVE-2025-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
    },
    {
      "name": "CVE-2025-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
    },
    {
      "name": "CVE-2025-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
    },
    {
      "name": "CVE-2025-21919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
    },
    {
      "name": "CVE-2025-21922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
    },
    {
      "name": "CVE-2025-21924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
    },
    {
      "name": "CVE-2025-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
    },
    {
      "name": "CVE-2025-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
    },
    {
      "name": "CVE-2025-21936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
    },
    {
      "name": "CVE-2025-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
    },
    {
      "name": "CVE-2025-21938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
    },
    {
      "name": "CVE-2025-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
    },
    {
      "name": "CVE-2025-21950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
    },
    {
      "name": "CVE-2025-21951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
    },
    {
      "name": "CVE-2025-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
    },
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2025-21969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
    },
    {
      "name": "CVE-2025-21696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-21927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
    },
    {
      "name": "CVE-2025-22089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
    },
    {
      "name": "CVE-2025-22093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
    },
    {
      "name": "CVE-2025-22095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22095"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-22126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2024-28956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
    },
    {
      "name": "CVE-2025-21953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
    },
    {
      "name": "CVE-2021-47670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47670"
    },
    {
      "name": "CVE-2022-49110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49110"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2022-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49767"
    },
    {
      "name": "CVE-2023-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53051"
    },
    {
      "name": "CVE-2024-35840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35840"
    },
    {
      "name": "CVE-2024-58018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
    },
    {
      "name": "CVE-2024-58070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2024-58094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
    },
    {
      "name": "CVE-2024-58095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
    },
    {
      "name": "CVE-2024-58096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
    },
    {
      "name": "CVE-2024-58097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
    },
    {
      "name": "CVE-2025-21729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21729"
    },
    {
      "name": "CVE-2025-21755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
    },
    {
      "name": "CVE-2025-21833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21852"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
    },
    {
      "name": "CVE-2025-21884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
    },
    {
      "name": "CVE-2025-21889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
    },
    {
      "name": "CVE-2025-21894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
    },
    {
      "name": "CVE-2025-21895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
    },
    {
      "name": "CVE-2025-21906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
    },
    {
      "name": "CVE-2025-21908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
    },
    {
      "name": "CVE-2025-21915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
    },
    {
      "name": "CVE-2025-21923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21923"
    },
    {
      "name": "CVE-2025-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
    },
    {
      "name": "CVE-2025-21931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
    },
    {
      "name": "CVE-2025-21961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
    },
    {
      "name": "CVE-2025-21966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
    },
    {
      "name": "CVE-2025-21972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
    },
    {
      "name": "CVE-2025-21985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
    },
    {
      "name": "CVE-2025-21995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
    },
    {
      "name": "CVE-2025-22001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
    },
    {
      "name": "CVE-2025-22003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
    },
    {
      "name": "CVE-2025-22009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
    },
    {
      "name": "CVE-2025-22013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
    },
    {
      "name": "CVE-2025-22016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
    },
    {
      "name": "CVE-2025-22017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22029"
    },
    {
      "name": "CVE-2025-22036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22036"
    },
    {
      "name": "CVE-2025-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-22064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22064"
    },
    {
      "name": "CVE-2025-22065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22065"
    },
    {
      "name": "CVE-2025-22080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22080"
    },
    {
      "name": "CVE-2025-22090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
    },
    {
      "name": "CVE-2025-22102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
    },
    {
      "name": "CVE-2025-22104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
    },
    {
      "name": "CVE-2025-22105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
    },
    {
      "name": "CVE-2025-22106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
    },
    {
      "name": "CVE-2025-22107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
    },
    {
      "name": "CVE-2025-22108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22108"
    },
    {
      "name": "CVE-2025-22109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
    },
    {
      "name": "CVE-2025-22115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
    },
    {
      "name": "CVE-2025-22116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
    },
    {
      "name": "CVE-2025-22121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
    },
    {
      "name": "CVE-2025-22128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
    },
    {
      "name": "CVE-2025-23129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
    },
    {
      "name": "CVE-2025-23131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
    },
    {
      "name": "CVE-2025-23133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2025-37860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2022-49190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49190"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
    },
    {
      "name": "CVE-2025-37752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37782"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
    },
    {
      "name": "CVE-2025-37820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
    },
    {
      "name": "CVE-2025-37854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
    },
    {
      "name": "CVE-2025-37979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
    },
    {
      "name": "CVE-2025-37901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
    },
    {
      "name": "CVE-2025-37903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-37917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
    },
    {
      "name": "CVE-2025-37928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
    },
    {
      "name": "CVE-2025-37929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37929"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
    },
    {
      "name": "CVE-2025-37948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
    },
    {
      "name": "CVE-2025-37953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37953"
    },
    {
      "name": "CVE-2025-37959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
    },
    {
      "name": "CVE-2025-37963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2022-49769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49769"
    },
    {
      "name": "CVE-2022-49770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49770"
    },
    {
      "name": "CVE-2022-49771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49771"
    },
    {
      "name": "CVE-2022-49772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49772"
    },
    {
      "name": "CVE-2022-49775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49775"
    },
    {
      "name": "CVE-2022-49776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49776"
    },
    {
      "name": "CVE-2022-49777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49777"
    },
    {
      "name": "CVE-2022-49779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49779"
    },
    {
      "name": "CVE-2022-49783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
    },
    {
      "name": "CVE-2022-49787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49787"
    },
    {
      "name": "CVE-2022-49788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49788"
    },
    {
      "name": "CVE-2022-49789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49789"
    },
    {
      "name": "CVE-2022-49790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49790"
    },
    {
      "name": "CVE-2022-49792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49792"
    },
    {
      "name": "CVE-2022-49793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49793"
    },
    {
      "name": "CVE-2022-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49794"
    },
    {
      "name": "CVE-2022-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49796"
    },
    {
      "name": "CVE-2022-49797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49797"
    },
    {
      "name": "CVE-2022-49799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49799"
    },
    {
      "name": "CVE-2022-49800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49800"
    },
    {
      "name": "CVE-2022-49801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49801"
    },
    {
      "name": "CVE-2022-49802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49802"
    },
    {
      "name": "CVE-2022-49807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49807"
    },
    {
      "name": "CVE-2022-49809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49809"
    },
    {
      "name": "CVE-2022-49810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
    },
    {
      "name": "CVE-2022-49812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49812"
    },
    {
      "name": "CVE-2022-49813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49813"
    },
    {
      "name": "CVE-2022-49818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49818"
    },
    {
      "name": "CVE-2022-49821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49821"
    },
    {
      "name": "CVE-2022-49822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49822"
    },
    {
      "name": "CVE-2022-49823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49823"
    },
    {
      "name": "CVE-2022-49824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49824"
    },
    {
      "name": "CVE-2022-49825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49825"
    },
    {
      "name": "CVE-2022-49826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49826"
    },
    {
      "name": "CVE-2022-49827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49827"
    },
    {
      "name": "CVE-2022-49830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49830"
    },
    {
      "name": "CVE-2022-49832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49832"
    },
    {
      "name": "CVE-2022-49834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49834"
    },
    {
      "name": "CVE-2022-49835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49835"
    },
    {
      "name": "CVE-2022-49836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49836"
    },
    {
      "name": "CVE-2022-49839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49839"
    },
    {
      "name": "CVE-2022-49841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49841"
    },
    {
      "name": "CVE-2022-49842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49842"
    },
    {
      "name": "CVE-2022-49845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49845"
    },
    {
      "name": "CVE-2022-49846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
    },
    {
      "name": "CVE-2022-49850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49850"
    },
    {
      "name": "CVE-2022-49853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49853"
    },
    {
      "name": "CVE-2022-49858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
    },
    {
      "name": "CVE-2022-49860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49860"
    },
    {
      "name": "CVE-2022-49861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49861"
    },
    {
      "name": "CVE-2022-49863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49863"
    },
    {
      "name": "CVE-2022-49864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49864"
    },
    {
      "name": "CVE-2022-49865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49865"
    },
    {
      "name": "CVE-2022-49868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49868"
    },
    {
      "name": "CVE-2022-49869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49869"
    },
    {
      "name": "CVE-2022-49870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49870"
    },
    {
      "name": "CVE-2022-49871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49871"
    },
    {
      "name": "CVE-2022-49874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49874"
    },
    {
      "name": "CVE-2022-49879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49879"
    },
    {
      "name": "CVE-2022-49880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49880"
    },
    {
      "name": "CVE-2022-49881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49881"
    },
    {
      "name": "CVE-2022-49885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49885"
    },
    {
      "name": "CVE-2022-49887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49887"
    },
    {
      "name": "CVE-2022-49888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49888"
    },
    {
      "name": "CVE-2022-49889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49889"
    },
    {
      "name": "CVE-2022-49890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49890"
    },
    {
      "name": "CVE-2022-49891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49891"
    },
    {
      "name": "CVE-2022-49892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49892"
    },
    {
      "name": "CVE-2022-49900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49900"
    },
    {
      "name": "CVE-2022-49905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49905"
    },
    {
      "name": "CVE-2022-49906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49906"
    },
    {
      "name": "CVE-2022-49908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49908"
    },
    {
      "name": "CVE-2022-49909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49909"
    },
    {
      "name": "CVE-2022-49910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
    },
    {
      "name": "CVE-2022-49915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49915"
    },
    {
      "name": "CVE-2022-49916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49916"
    },
    {
      "name": "CVE-2022-49922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49922"
    },
    {
      "name": "CVE-2022-49923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49923"
    },
    {
      "name": "CVE-2022-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49924"
    },
    {
      "name": "CVE-2022-49925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49925"
    },
    {
      "name": "CVE-2022-49927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49927"
    },
    {
      "name": "CVE-2022-49928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49928"
    },
    {
      "name": "CVE-2022-49931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49931"
    },
    {
      "name": "CVE-2023-53035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53035"
    },
    {
      "name": "CVE-2023-53038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53038"
    },
    {
      "name": "CVE-2023-53039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53039"
    },
    {
      "name": "CVE-2023-53040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53040"
    },
    {
      "name": "CVE-2023-53041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53041"
    },
    {
      "name": "CVE-2023-53044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53044"
    },
    {
      "name": "CVE-2023-53045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53045"
    },
    {
      "name": "CVE-2023-53049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53049"
    },
    {
      "name": "CVE-2023-53052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
    },
    {
      "name": "CVE-2023-53054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53054"
    },
    {
      "name": "CVE-2023-53056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53056"
    },
    {
      "name": "CVE-2023-53058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53058"
    },
    {
      "name": "CVE-2023-53059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53059"
    },
    {
      "name": "CVE-2023-53060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53060"
    },
    {
      "name": "CVE-2023-53062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53062"
    },
    {
      "name": "CVE-2023-53064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53064"
    },
    {
      "name": "CVE-2023-53065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53065"
    },
    {
      "name": "CVE-2023-53066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53066"
    },
    {
      "name": "CVE-2023-53068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
    },
    {
      "name": "CVE-2023-53075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53075"
    },
    {
      "name": "CVE-2023-53077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53077"
    },
    {
      "name": "CVE-2023-53078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53078"
    },
    {
      "name": "CVE-2023-53079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53079"
    },
    {
      "name": "CVE-2023-53081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53081"
    },
    {
      "name": "CVE-2023-53084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53084"
    },
    {
      "name": "CVE-2023-53087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53087"
    },
    {
      "name": "CVE-2023-53089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53089"
    },
    {
      "name": "CVE-2023-53090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53090"
    },
    {
      "name": "CVE-2023-53091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53091"
    },
    {
      "name": "CVE-2023-53092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53092"
    },
    {
      "name": "CVE-2023-53093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
    },
    {
      "name": "CVE-2023-53096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53096"
    },
    {
      "name": "CVE-2023-53098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53098"
    },
    {
      "name": "CVE-2023-53099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53099"
    },
    {
      "name": "CVE-2023-53100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53100"
    },
    {
      "name": "CVE-2023-53101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53101"
    },
    {
      "name": "CVE-2023-53106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53106"
    },
    {
      "name": "CVE-2023-53108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53108"
    },
    {
      "name": "CVE-2023-53111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53111"
    },
    {
      "name": "CVE-2023-53114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53114"
    },
    {
      "name": "CVE-2023-53116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53116"
    },
    {
      "name": "CVE-2023-53118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53118"
    },
    {
      "name": "CVE-2023-53119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53119"
    },
    {
      "name": "CVE-2023-53123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53123"
    },
    {
      "name": "CVE-2023-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53124"
    },
    {
      "name": "CVE-2023-53125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53125"
    },
    {
      "name": "CVE-2023-53131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53131"
    },
    {
      "name": "CVE-2023-53134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53134"
    },
    {
      "name": "CVE-2023-53137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53137"
    },
    {
      "name": "CVE-2023-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53139"
    },
    {
      "name": "CVE-2023-53140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53140"
    },
    {
      "name": "CVE-2023-53142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53142"
    },
    {
      "name": "CVE-2023-53143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53143"
    },
    {
      "name": "CVE-2023-53145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53145"
    },
    {
      "name": "CVE-2025-22030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22030"
    },
    {
      "name": "CVE-2025-22057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
    },
    {
      "name": "CVE-2025-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22070"
    },
    {
      "name": "CVE-2025-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
    },
    {
      "name": "CVE-2025-22125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
    },
    {
      "name": "CVE-2025-23160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
    },
    {
      "name": "CVE-2025-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
    },
    {
      "name": "CVE-2025-37755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
    },
    {
      "name": "CVE-2025-37804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37804"
    },
    {
      "name": "CVE-2025-37809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
    },
    {
      "name": "CVE-2025-37831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
    },
    {
      "name": "CVE-2025-37833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
    },
    {
      "name": "CVE-2025-37842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
    },
    {
      "name": "CVE-2025-37870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
    },
    {
      "name": "CVE-2025-37886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
    },
    {
      "name": "CVE-2025-37887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
    },
    {
      "name": "CVE-2025-37957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
    },
    {
      "name": "CVE-2025-37958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
    },
    {
      "name": "CVE-2025-37960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
    },
    {
      "name": "CVE-2025-37974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
    },
    {
      "name": "CVE-2025-40325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
    },
    {
      "name": "CVE-2025-37943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
    },
    {
      "name": "CVE-2020-36790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36790"
    },
    {
      "name": "CVE-2020-36791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36791"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2022-49420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
    },
    {
      "name": "CVE-2022-49761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49761"
    },
    {
      "name": "CVE-2022-49762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49762"
    },
    {
      "name": "CVE-2022-49763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49763"
    },
    {
      "name": "CVE-2022-49773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
    },
    {
      "name": "CVE-2022-49781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49781"
    },
    {
      "name": "CVE-2022-49784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49784"
    },
    {
      "name": "CVE-2022-49786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49786"
    },
    {
      "name": "CVE-2022-49795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49795"
    },
    {
      "name": "CVE-2022-49829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
    },
    {
      "name": "CVE-2022-49837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49837"
    },
    {
      "name": "CVE-2022-49840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49840"
    },
    {
      "name": "CVE-2022-49862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49862"
    },
    {
      "name": "CVE-2022-49872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49872"
    },
    {
      "name": "CVE-2022-49877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49877"
    },
    {
      "name": "CVE-2022-49886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49886"
    },
    {
      "name": "CVE-2022-49898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49898"
    },
    {
      "name": "CVE-2022-49901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
    },
    {
      "name": "CVE-2022-49902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49902"
    },
    {
      "name": "CVE-2022-49907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49907"
    },
    {
      "name": "CVE-2022-49913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49913"
    },
    {
      "name": "CVE-2022-49914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49914"
    },
    {
      "name": "CVE-2022-49917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49917"
    },
    {
      "name": "CVE-2022-49918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49918"
    },
    {
      "name": "CVE-2022-49921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49921"
    },
    {
      "name": "CVE-2022-49929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49929"
    },
    {
      "name": "CVE-2023-53036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
    },
    {
      "name": "CVE-2023-53042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
    },
    {
      "name": "CVE-2023-53057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53057"
    },
    {
      "name": "CVE-2023-53070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53070"
    },
    {
      "name": "CVE-2023-53071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53071"
    },
    {
      "name": "CVE-2023-53073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53073"
    },
    {
      "name": "CVE-2023-53074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53074"
    },
    {
      "name": "CVE-2023-53080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53080"
    },
    {
      "name": "CVE-2023-53082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53082"
    },
    {
      "name": "CVE-2023-53094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53094"
    },
    {
      "name": "CVE-2023-53095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53095"
    },
    {
      "name": "CVE-2023-53102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53102"
    },
    {
      "name": "CVE-2023-53103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53103"
    },
    {
      "name": "CVE-2023-53105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
    },
    {
      "name": "CVE-2023-53109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53109"
    },
    {
      "name": "CVE-2023-53112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53112"
    },
    {
      "name": "CVE-2023-53121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53121"
    },
    {
      "name": "CVE-2023-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53128"
    },
    {
      "name": "CVE-2023-53141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53141"
    },
    {
      "name": "CVE-2023-53146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53146"
    },
    {
      "name": "CVE-2024-49570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49570"
    },
    {
      "name": "CVE-2024-58074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
    },
    {
      "name": "CVE-2024-58091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58091"
    },
    {
      "name": "CVE-2024-58098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
    },
    {
      "name": "CVE-2024-58099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58099"
    },
    {
      "name": "CVE-2024-58100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
    },
    {
      "name": "CVE-2024-58237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
    },
    {
      "name": "CVE-2025-21717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21717"
    },
    {
      "name": "CVE-2025-21800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21800"
    },
    {
      "name": "CVE-2025-21837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21837"
    },
    {
      "name": "CVE-2025-21868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
    },
    {
      "name": "CVE-2025-21882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21882"
    },
    {
      "name": "CVE-2025-21893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21893"
    },
    {
      "name": "CVE-2025-21929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
    },
    {
      "name": "CVE-2025-21973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21973"
    },
    {
      "name": "CVE-2025-21974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
    },
    {
      "name": "CVE-2025-21989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21989"
    },
    {
      "name": "CVE-2025-21990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21990"
    },
    {
      "name": "CVE-2025-22028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
    },
    {
      "name": "CVE-2025-22085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22085"
    },
    {
      "name": "CVE-2025-22091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22091"
    },
    {
      "name": "CVE-2025-22094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22094"
    },
    {
      "name": "CVE-2025-22112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22112"
    },
    {
      "name": "CVE-2025-22113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
    },
    {
      "name": "CVE-2025-22117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22117"
    },
    {
      "name": "CVE-2025-22118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22118"
    },
    {
      "name": "CVE-2025-22119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22119"
    },
    {
      "name": "CVE-2025-22124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
    },
    {
      "name": "CVE-2025-23134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23134"
    },
    {
      "name": "CVE-2025-23149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
    },
    {
      "name": "CVE-2025-23154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23154"
    },
    {
      "name": "CVE-2025-23155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
    },
    {
      "name": "CVE-2025-37743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
    },
    {
      "name": "CVE-2025-37747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
    },
    {
      "name": "CVE-2025-37754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
    },
    {
      "name": "CVE-2025-37793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
    },
    {
      "name": "CVE-2025-37800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
    },
    {
      "name": "CVE-2025-37846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
    },
    {
      "name": "CVE-2025-37853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
    },
    {
      "name": "CVE-2025-37873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
    },
    {
      "name": "CVE-2025-37874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
    },
    {
      "name": "CVE-2025-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
    },
    {
      "name": "CVE-2025-37900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
    },
    {
      "name": "CVE-2025-37918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
    },
    {
      "name": "CVE-2025-37925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
    },
    {
      "name": "CVE-2025-37931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
    },
    {
      "name": "CVE-2025-37933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
    },
    {
      "name": "CVE-2025-37944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
    },
    {
      "name": "CVE-2025-37954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
    },
    {
      "name": "CVE-2025-37968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
    },
    {
      "name": "CVE-2025-37978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
    },
    {
      "name": "CVE-2025-37980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
    },
    {
      "name": "CVE-2025-37986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
    },
    {
      "name": "CVE-2025-37987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2025-38104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
    },
    {
      "name": "CVE-2025-38240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38240"
    },
    {
      "name": "CVE-2025-40014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40014"
    },
    {
      "name": "CVE-2025-40364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
    }
  ],
  "initial_release_date": "2025-06-20T00:00:00",
  "last_revision_date": "2025-06-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0529",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01951-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501951-1"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01995-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501995-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01964-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501964-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01948-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501948-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01958-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501958-1"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01982-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501982-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01944-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501944-1"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01972-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01950-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501950-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20413-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520413-1"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02000-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502000-1"
    },
    {
      "published_at": "2025-06-15",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20419-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520419-1"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01983-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501983-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20421-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520421-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01965-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501965-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01949-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501949-1"
    },
    {
      "published_at": "2025-06-15",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20408-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520408-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01957-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501957-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01967-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501967-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01966-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01956-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501956-1"
    }
  ]
}
  CERTFR-2025-AVI-0482
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Micro 6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2024-53042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2025-22107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
    },
    {
      "name": "CVE-2024-27018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27018"
    },
    {
      "name": "CVE-2025-22033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-22017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
    },
    {
      "name": "CVE-2024-58094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22036"
    },
    {
      "name": "CVE-2025-21852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21852"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-21931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-23129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
    },
    {
      "name": "CVE-2024-57882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
    },
    {
      "name": "CVE-2025-22106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
    },
    {
      "name": "CVE-2025-22093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-23131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
    },
    {
      "name": "CVE-2025-22116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
    },
    {
      "name": "CVE-2024-50162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
    },
    {
      "name": "CVE-2025-22105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
    },
    {
      "name": "CVE-2025-21833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2024-58070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
    },
    {
      "name": "CVE-2025-22090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-22080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22080"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2024-58095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2024-35840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35840"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
    },
    {
      "name": "CVE-2024-50115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50115"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-21683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2025-22029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22029"
    },
    {
      "name": "CVE-2025-22104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2024-28956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
    },
    {
      "name": "CVE-2025-22109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22065"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2024-57924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2024-50083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
    },
    {
      "name": "CVE-2024-58096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
    },
    {
      "name": "CVE-2024-56641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
    },
    {
      "name": "CVE-2024-46763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
    },
    {
      "name": "CVE-2024-50163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-22102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
    },
    {
      "name": "CVE-2024-56702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
    },
    {
      "name": "CVE-2025-22016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
    },
    {
      "name": "CVE-2025-21696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
    },
    {
      "name": "CVE-2024-58097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2024-53156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
    },
    {
      "name": "CVE-2025-22108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22108"
    },
    {
      "name": "CVE-2025-23133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
    },
    {
      "name": "CVE-2025-22128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
    },
    {
      "name": "CVE-2024-46865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2024-27415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27415"
    },
    {
      "name": "CVE-2025-22064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22064"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
    },
    {
      "name": "CVE-2025-22088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
    },
    {
      "name": "CVE-2025-22115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    }
  ],
  "initial_release_date": "2025-06-06T00:00:00",
  "last_revision_date": "2025-06-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0482",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": "2025-05-23",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20355-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520355-1"
    },
    {
      "published_at": "2025-05-28",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20367-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520367-1"
    },
    {
      "published_at": "2025-05-23",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20354-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520354-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20370-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520370-1"
    },
    {
      "published_at": "2025-05-28",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20366-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520366-1"
    }
  ]
}
  CERTFR-2025-AVI-0758
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 16.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 20.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 24.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 14.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 22.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-52477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2024-27074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27074"
    },
    {
      "name": "CVE-2024-26739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
    },
    {
      "name": "CVE-2021-47345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47345"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2024-35867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
    },
    {
      "name": "CVE-2024-35943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2024-38540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2024-36908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
    },
    {
      "name": "CVE-2024-27402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
    },
    {
      "name": "CVE-2022-48893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2024-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2024-46816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
    },
    {
      "name": "CVE-2024-47685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
    },
    {
      "name": "CVE-2024-49960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2024-50272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2024-27407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
    },
    {
      "name": "CVE-2024-49989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
    },
    {
      "name": "CVE-2024-50125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2024-50202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
    },
    {
      "name": "CVE-2024-53130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53130"
    },
    {
      "name": "CVE-2024-53131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53131"
    },
    {
      "name": "CVE-2024-50051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50051"
    },
    {
      "name": "CVE-2024-50258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
    },
    {
      "name": "CVE-2024-53203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
    },
    {
      "name": "CVE-2024-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
    },
    {
      "name": "CVE-2024-49887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2024-57979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
    },
    {
      "name": "CVE-2024-57994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
    },
    {
      "name": "CVE-2025-21705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
    },
    {
      "name": "CVE-2025-21715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
    },
    {
      "name": "CVE-2025-21716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
    },
    {
      "name": "CVE-2025-21719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
    },
    {
      "name": "CVE-2025-21724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
    },
    {
      "name": "CVE-2025-21725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2025-21754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
    },
    {
      "name": "CVE-2025-21802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2024-58014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
    },
    {
      "name": "CVE-2025-21718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2024-57973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
    },
    {
      "name": "CVE-2024-57980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
    },
    {
      "name": "CVE-2024-57981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
    },
    {
      "name": "CVE-2024-57986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
    },
    {
      "name": "CVE-2024-57993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
    },
    {
      "name": "CVE-2024-57997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2024-58007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
    },
    {
      "name": "CVE-2024-58010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
    },
    {
      "name": "CVE-2024-58011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
    },
    {
      "name": "CVE-2024-58013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
    },
    {
      "name": "CVE-2024-58016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
    },
    {
      "name": "CVE-2024-58017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2024-58034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
    },
    {
      "name": "CVE-2024-58051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
    },
    {
      "name": "CVE-2024-58052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
    },
    {
      "name": "CVE-2024-58054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
    },
    {
      "name": "CVE-2024-58055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
    },
    {
      "name": "CVE-2024-58056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
    },
    {
      "name": "CVE-2024-58058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
    },
    {
      "name": "CVE-2024-58061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
    },
    {
      "name": "CVE-2024-58063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-58069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-58072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
    },
    {
      "name": "CVE-2024-58076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
    },
    {
      "name": "CVE-2024-58077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
    },
    {
      "name": "CVE-2024-58080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2024-58085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
    },
    {
      "name": "CVE-2025-21711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
    },
    {
      "name": "CVE-2025-21722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
    },
    {
      "name": "CVE-2025-21726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
    },
    {
      "name": "CVE-2025-21727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
    },
    {
      "name": "CVE-2025-21731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
    },
    {
      "name": "CVE-2025-21734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
    },
    {
      "name": "CVE-2025-21735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
    },
    {
      "name": "CVE-2025-21736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
    },
    {
      "name": "CVE-2025-21738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
    },
    {
      "name": "CVE-2025-21744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
    },
    {
      "name": "CVE-2025-21749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
    },
    {
      "name": "CVE-2025-21750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2025-21814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
    },
    {
      "name": "CVE-2025-21820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
    },
    {
      "name": "CVE-2025-21829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
    },
    {
      "name": "CVE-2025-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
    },
    {
      "name": "CVE-2025-21832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2024-57974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
    },
    {
      "name": "CVE-2024-57990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
    },
    {
      "name": "CVE-2024-57999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
    },
    {
      "name": "CVE-2024-58002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2024-58006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
    },
    {
      "name": "CVE-2024-58019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
    },
    {
      "name": "CVE-2024-58057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
    },
    {
      "name": "CVE-2024-58078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
    },
    {
      "name": "CVE-2024-58079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
    },
    {
      "name": "CVE-2025-21714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
    },
    {
      "name": "CVE-2025-21723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
    },
    {
      "name": "CVE-2025-21732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
    },
    {
      "name": "CVE-2025-21739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
    },
    {
      "name": "CVE-2025-21741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
    },
    {
      "name": "CVE-2025-21742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
    },
    {
      "name": "CVE-2025-21743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2025-21773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
    },
    {
      "name": "CVE-2025-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
    },
    {
      "name": "CVE-2025-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
    },
    {
      "name": "CVE-2025-21810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
    },
    {
      "name": "CVE-2025-21815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
    },
    {
      "name": "CVE-2025-21825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
    },
    {
      "name": "CVE-2025-21828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-21721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2024-46742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2024-58081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
    },
    {
      "name": "CVE-2024-58018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
    },
    {
      "name": "CVE-2024-58070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-37909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-37923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
    },
    {
      "name": "CVE-2025-37927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2025-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
    },
    {
      "name": "CVE-2025-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
    },
    {
      "name": "CVE-2025-37974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2025-21868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2024-57982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
    },
    {
      "name": "CVE-2024-58053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
    },
    {
      "name": "CVE-2025-21720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-38003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
    },
    {
      "name": "CVE-2025-38004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2025-38031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
    },
    {
      "name": "CVE-2025-38043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
    },
    {
      "name": "CVE-2025-38044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
    },
    {
      "name": "CVE-2025-38065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
    },
    {
      "name": "CVE-2025-38068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
    },
    {
      "name": "CVE-2025-38072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
    },
    {
      "name": "CVE-2025-38077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
    },
    {
      "name": "CVE-2025-38078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
    },
    {
      "name": "CVE-2025-38079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2022-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
    },
    {
      "name": "CVE-2025-38061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
    },
    {
      "name": "CVE-2025-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
    },
    {
      "name": "CVE-2024-57953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
    },
    {
      "name": "CVE-2024-57975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
    },
    {
      "name": "CVE-2024-57984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57984"
    },
    {
      "name": "CVE-2024-58003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
    },
    {
      "name": "CVE-2024-58082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
    },
    {
      "name": "CVE-2025-21710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
    },
    {
      "name": "CVE-2025-21798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
    },
    {
      "name": "CVE-2025-21801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
    },
    {
      "name": "CVE-2025-21809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
    },
    {
      "name": "CVE-2025-21816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-38052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
    },
    {
      "name": "CVE-2025-38034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
    },
    {
      "name": "CVE-2025-38035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
    },
    {
      "name": "CVE-2025-38037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
    },
    {
      "name": "CVE-2025-38048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
    },
    {
      "name": "CVE-2025-38051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
    },
    {
      "name": "CVE-2025-38058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
    },
    {
      "name": "CVE-2025-38066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
    },
    {
      "name": "CVE-2025-38075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
    },
    {
      "name": "CVE-2025-38174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
    },
    {
      "name": "CVE-2025-38350",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
    },
    {
      "name": "CVE-2024-54456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
    },
    {
      "name": "CVE-2025-21746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
    },
    {
      "name": "CVE-2025-21783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
    },
    {
      "name": "CVE-2025-21786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
    }
  ],
  "initial_release_date": "2025-09-05T00:00:00",
  "last_revision_date": "2025-09-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0758",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": "2025-09-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7726-4",
      "url": "https://ubuntu.com/security/notices/USN-7726-4"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7725-1",
      "url": "https://ubuntu.com/security/notices/USN-7725-1"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7726-2",
      "url": "https://ubuntu.com/security/notices/USN-7726-2"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7703-4",
      "url": "https://ubuntu.com/security/notices/USN-7703-4"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7726-3",
      "url": "https://ubuntu.com/security/notices/USN-7726-3"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7724-1",
      "url": "https://ubuntu.com/security/notices/USN-7724-1"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7727-2",
      "url": "https://ubuntu.com/security/notices/USN-7727-2"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7725-2",
      "url": "https://ubuntu.com/security/notices/USN-7725-2"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-5",
      "url": "https://ubuntu.com/security/notices/USN-7704-5"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7727-1",
      "url": "https://ubuntu.com/security/notices/USN-7727-1"
    },
    {
      "published_at": "2025-09-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7727-3",
      "url": "https://ubuntu.com/security/notices/USN-7727-3"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7726-1",
      "url": "https://ubuntu.com/security/notices/USN-7726-1"
    },
    {
      "published_at": "2025-09-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7712-2",
      "url": "https://ubuntu.com/security/notices/USN-7712-2"
    },
    {
      "published_at": "2025-09-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7725-3",
      "url": "https://ubuntu.com/security/notices/USN-7725-3"
    },
    {
      "published_at": "2025-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7737-1",
      "url": "https://ubuntu.com/security/notices/USN-7737-1"
    }
  ]
}
  CERTFR-2025-AVI-0492
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC432 (6GK5432-0GR00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC432 (6GK5432-0GR00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC332 (6GK5332-0GA00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SIMATIC | SIMATIC S7-1500 versions supérieures ou égales àV3.1.5 pour les vulnérabilités CVE-2021-41617, CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5363, CVE-2023-6246, CVE-2023-6779, CVE-2023-6780, CVE-2023-28531, CVE-2023-38545, CVE-2023-38546, CVE-2023-44487, CVE-2023-46218, CVE-2023-46219, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2023-52927, CVE-2024-2961, CVE-2024-6119, CVE-2024-6387, CVE-2024-12133, CVE-2024-12243, CVE-2024-24855, CVE-2024-26596, CVE-2024-28085, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-37370, CVE-2024-37371, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50246, CVE-2024-53166, CVE-2024-57977, CVE-2024-57996, CVE-2024-58005, CVE-2025-4373, CVE-2025-4598, CVE-2025-21701, CVE-2025-21702, CVE-2025-21712, CVE-2025-21724, CVE-2025-21728, CVE-2025-21745, CVE-2025-21756, CVE-2025-21758, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21795, CVE-2025-21796, CVE-2025-21848, CVE-2025-21862, CVE-2025-21864, CVE-2025-21865, CVE-2025-26465, CVE-2025-31115 et CVE-2025-46836. | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC332 (6GK5332-0GA00-2AC2) versions antérieures à V3.2 | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC432 (6GK5432-0GR00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC432 (6GK5432-0GR00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC332 (6GK5332-0GA00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 versions sup\u00e9rieures ou \u00e9gales \u00e0V3.1.5 pour les vuln\u00e9rabilit\u00e9s CVE-2021-41617, CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5363, CVE-2023-6246, CVE-2023-6779, CVE-2023-6780, CVE-2023-28531, CVE-2023-38545, CVE-2023-38546, CVE-2023-44487, CVE-2023-46218, CVE-2023-46219, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2023-52927, CVE-2024-2961, CVE-2024-6119, CVE-2024-6387, CVE-2024-12133, CVE-2024-12243, CVE-2024-24855, CVE-2024-26596, CVE-2024-28085, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-37370, CVE-2024-37371, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50246, CVE-2024-53166, CVE-2024-57977, CVE-2024-57996, CVE-2024-58005, CVE-2025-4373, CVE-2025-4598, CVE-2025-21701, CVE-2025-21702, CVE-2025-21712, CVE-2025-21724, CVE-2025-21728, CVE-2025-21745, CVE-2025-21756, CVE-2025-21758, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21795, CVE-2025-21796, CVE-2025-21848, CVE-2025-21862, CVE-2025-21864, CVE-2025-21865, CVE-2025-26465, CVE-2025-31115 et CVE-2025-46836.",
      "product": {
        "name": "SIMATIC",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC332 (6GK5332-0GA00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
    },
    {
      "name": "CVE-2024-41797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41797"
    },
    {
      "name": "CVE-2025-26465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
    },
    {
      "name": "CVE-2025-31115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-28531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28531"
    },
    {
      "name": "CVE-2023-6780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
    },
    {
      "name": "CVE-2023-51385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2025-40568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40568"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2024-45492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
    },
    {
      "name": "CVE-2024-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
    },
    {
      "name": "CVE-2025-40569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40569"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-4373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
    },
    {
      "name": "CVE-2025-4598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-6779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2023-46219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2024-45490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2024-45491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2024-26596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26596"
    },
    {
      "name": "CVE-2023-4527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2024-53166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
    },
    {
      "name": "CVE-2025-46836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46836"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-40567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40567"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-28085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2025-21702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2025-21724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
    },
    {
      "name": "CVE-2025-21701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2023-4911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
    },
    {
      "name": "CVE-2024-6387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
    },
    {
      "name": "CVE-2023-51384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
    },
    {
      "name": "CVE-2021-41617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
    },
    {
      "name": "CVE-2024-50246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
    },
    {
      "name": "CVE-2024-34397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
    },
    {
      "name": "CVE-2023-6246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2025-21756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    },
    {
      "name": "CVE-2023-38545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
    }
  ],
  "initial_release_date": "2025-06-11T00:00:00",
  "last_revision_date": "2025-06-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0492",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-082556",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-633269",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-633269.html"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693776",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-693776.html"
    }
  ]
}
  CERTFR-2025-AVI-0465
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Micro 6.0 | ||
| SUSE | N/A | Public Cloud Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro Extras 6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro 6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Public Cloud Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-22003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2025-21889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
    },
    {
      "name": "CVE-2024-53042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
    },
    {
      "name": "CVE-2025-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2025-22107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
    },
    {
      "name": "CVE-2024-27018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27018"
    },
    {
      "name": "CVE-2025-22033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-22017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
    },
    {
      "name": "CVE-2024-58094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
    },
    {
      "name": "CVE-2025-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
    },
    {
      "name": "CVE-2025-21951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22036"
    },
    {
      "name": "CVE-2025-21852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21852"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-21931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-23129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
    },
    {
      "name": "CVE-2024-50038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
    },
    {
      "name": "CVE-2024-57882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
    },
    {
      "name": "CVE-2025-22106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
    },
    {
      "name": "CVE-2025-21922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
    },
    {
      "name": "CVE-2025-22093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-23131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
    },
    {
      "name": "CVE-2025-22009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
    },
    {
      "name": "CVE-2025-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
    },
    {
      "name": "CVE-2025-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
    },
    {
      "name": "CVE-2025-22116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
    },
    {
      "name": "CVE-2025-21993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
    },
    {
      "name": "CVE-2024-50162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-22105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
    },
    {
      "name": "CVE-2025-21833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
    },
    {
      "name": "CVE-2025-21729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21729"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2024-58070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
    },
    {
      "name": "CVE-2025-22090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
    },
    {
      "name": "CVE-2025-21914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
    },
    {
      "name": "CVE-2025-21995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
    },
    {
      "name": "CVE-2025-21915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2024-58018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
    },
    {
      "name": "CVE-2025-21972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
    },
    {
      "name": "CVE-2024-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
    },
    {
      "name": "CVE-2025-21755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
    },
    {
      "name": "CVE-2025-21961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-22080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22080"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
    },
    {
      "name": "CVE-2025-21909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
    },
    {
      "name": "CVE-2024-58095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2024-35840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35840"
    },
    {
      "name": "CVE-2025-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2024-50115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50115"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-21978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
    },
    {
      "name": "CVE-2025-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-21966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
    },
    {
      "name": "CVE-2024-56600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56600"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-21683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
    },
    {
      "name": "CVE-2025-21908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
    },
    {
      "name": "CVE-2025-21895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
    },
    {
      "name": "CVE-2024-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53139"
    },
    {
      "name": "CVE-2025-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2025-22029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22029"
    },
    {
      "name": "CVE-2025-22104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
    },
    {
      "name": "CVE-2025-21950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
    },
    {
      "name": "CVE-2025-22001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-28956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
    },
    {
      "name": "CVE-2025-21943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
    },
    {
      "name": "CVE-2025-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
    },
    {
      "name": "CVE-2025-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
    },
    {
      "name": "CVE-2025-21985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
    },
    {
      "name": "CVE-2025-22109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22065"
    },
    {
      "name": "CVE-2024-43882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2024-57924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
    },
    {
      "name": "CVE-2025-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2024-50083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
    },
    {
      "name": "CVE-2024-58096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
    },
    {
      "name": "CVE-2025-21906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
    },
    {
      "name": "CVE-2024-56641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
    },
    {
      "name": "CVE-2024-46763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
    },
    {
      "name": "CVE-2025-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
    },
    {
      "name": "CVE-2024-50163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
    },
    {
      "name": "CVE-2025-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
    },
    {
      "name": "CVE-2025-22102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
    },
    {
      "name": "CVE-2024-56702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
    },
    {
      "name": "CVE-2025-22016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
    },
    {
      "name": "CVE-2025-21696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
    },
    {
      "name": "CVE-2025-21923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21923"
    },
    {
      "name": "CVE-2024-58097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2025-22013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
    },
    {
      "name": "CVE-2025-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
    },
    {
      "name": "CVE-2024-53156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-22108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22108"
    },
    {
      "name": "CVE-2025-23133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
    },
    {
      "name": "CVE-2025-22128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-21969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
    },
    {
      "name": "CVE-2024-46865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
    },
    {
      "name": "CVE-2025-21894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2024-27415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27415"
    },
    {
      "name": "CVE-2025-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
    },
    {
      "name": "CVE-2025-22064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22064"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
    },
    {
      "name": "CVE-2025-21924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
    },
    {
      "name": "CVE-2025-22088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
    },
    {
      "name": "CVE-2024-56650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56650"
    },
    {
      "name": "CVE-2025-22115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2024-53237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53237"
    }
  ],
  "initial_release_date": "2025-05-30T00:00:00",
  "last_revision_date": "2025-05-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0465",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": "2025-05-28",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20349-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520349-1"
    },
    {
      "published_at": "2025-05-23",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20344-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520344-1"
    },
    {
      "published_at": "2025-05-23",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01692-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501692-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20339-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520339-1"
    },
    {
      "published_at": "2025-05-23",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20343-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520343-1"
    },
    {
      "published_at": "2025-05-28",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20351-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520351-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20342-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520342-1"
    },
    {
      "published_at": "2025-05-28",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20350-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520350-1"
    },
    {
      "published_at": "2025-05-26",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01707-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501707-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20341-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520341-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20340-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520340-1"
    }
  ]
}
  CERTFR-2025-AVI-0743
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 24.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 22.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2024-53203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-38043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-21783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
    },
    {
      "name": "CVE-2025-21786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2024-50125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-38061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2024-35867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-38004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
    },
    {
      "name": "CVE-2024-46816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-21746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-38066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-37927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2024-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
    },
    {
      "name": "CVE-2025-38068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-21868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-38065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
    },
    {
      "name": "CVE-2025-38031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
    },
    {
      "name": "CVE-2024-49960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-38034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2025-38078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2025-38077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2022-48893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-38003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
    },
    {
      "name": "CVE-2025-37923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-38079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2024-46742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
    },
    {
      "name": "CVE-2024-50272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2024-27402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-38037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-38072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-38075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2025-38058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
    },
    {
      "name": "CVE-2024-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2024-26739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2024-49989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
    },
    {
      "name": "CVE-2024-36908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2024-50258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-38048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2024-54456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-21773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
    },
    {
      "name": "CVE-2024-38540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-38052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
    },
    {
      "name": "CVE-2025-38035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-38051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-38044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
    },
    {
      "name": "CVE-2025-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
    },
    {
      "name": "CVE-2024-35943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2022-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    }
  ],
  "initial_release_date": "2025-08-29T00:00:00",
  "last_revision_date": "2025-08-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0743",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": "2025-08-22",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7711-1",
      "url": "https://ubuntu.com/security/notices/USN-7711-1"
    },
    {
      "published_at": "2025-08-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7719-1",
      "url": "https://ubuntu.com/security/notices/USN-7719-1"
    },
    {
      "published_at": "2025-08-22",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7712-1",
      "url": "https://ubuntu.com/security/notices/USN-7712-1"
    }
  ]
}
  CERTFR-2025-AVI-0449
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Manager Proxy 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Manager Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | N/A | SUSE Manager Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Proxy 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Desktop 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Proxy 4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Basesystem Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Retail Branch Server 4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Server 4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Legacy Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Retail Branch Server 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Enterprise Storage 7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Server 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Development Tools Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-0179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
    },
    {
      "name": "CVE-2024-27018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27018"
    },
    {
      "name": "CVE-2024-27415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27415"
    },
    {
      "name": "CVE-2022-48933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48933"
    },
    {
      "name": "CVE-2024-43882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
    },
    {
      "name": "CVE-2024-46763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
    },
    {
      "name": "CVE-2024-46784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
    },
    {
      "name": "CVE-2024-46865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
    },
    {
      "name": "CVE-2024-50272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
    },
    {
      "name": "CVE-2024-53042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
    },
    {
      "name": "CVE-2021-47163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47163"
    },
    {
      "name": "CVE-2024-42307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307"
    },
    {
      "name": "CVE-2024-50038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
    },
    {
      "name": "CVE-2024-50115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50115"
    },
    {
      "name": "CVE-2024-50083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
    },
    {
      "name": "CVE-2024-50162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
    },
    {
      "name": "CVE-2024-50163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
    },
    {
      "name": "CVE-2024-53156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
    },
    {
      "name": "CVE-2024-56590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56590"
    },
    {
      "name": "CVE-2024-56641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
    },
    {
      "name": "CVE-2024-56642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56642"
    },
    {
      "name": "CVE-2024-56661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56661"
    },
    {
      "name": "CVE-2024-49994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
    },
    {
      "name": "CVE-2024-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
    },
    {
      "name": "CVE-2025-21683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
    },
    {
      "name": "CVE-2024-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53139"
    },
    {
      "name": "CVE-2024-56702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
    },
    {
      "name": "CVE-2021-47659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
    },
    {
      "name": "CVE-2022-49044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49044"
    },
    {
      "name": "CVE-2022-49055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49055"
    },
    {
      "name": "CVE-2022-49060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49060"
    },
    {
      "name": "CVE-2022-49086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
    },
    {
      "name": "CVE-2022-49111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49111"
    },
    {
      "name": "CVE-2022-49118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
    },
    {
      "name": "CVE-2022-49121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49121"
    },
    {
      "name": "CVE-2022-49137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49137"
    },
    {
      "name": "CVE-2022-49175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
    },
    {
      "name": "CVE-2022-49176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49176"
    },
    {
      "name": "CVE-2022-49179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49179"
    },
    {
      "name": "CVE-2022-49188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
    },
    {
      "name": "CVE-2022-49232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49232"
    },
    {
      "name": "CVE-2022-49290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
    },
    {
      "name": "CVE-2022-49305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49305"
    },
    {
      "name": "CVE-2022-49335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49335"
    },
    {
      "name": "CVE-2022-49351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49351"
    },
    {
      "name": "CVE-2022-49385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49385"
    },
    {
      "name": "CVE-2022-49411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49411"
    },
    {
      "name": "CVE-2022-49442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49442"
    },
    {
      "name": "CVE-2022-49478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49478"
    },
    {
      "name": "CVE-2022-49489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49489"
    },
    {
      "name": "CVE-2022-49504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
    },
    {
      "name": "CVE-2022-49521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
    },
    {
      "name": "CVE-2022-49525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49525"
    },
    {
      "name": "CVE-2022-49534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2022-49536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49536"
    },
    {
      "name": "CVE-2022-49537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49537"
    },
    {
      "name": "CVE-2022-49542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49542"
    },
    {
      "name": "CVE-2022-49668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49668"
    },
    {
      "name": "CVE-2022-49693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49693"
    },
    {
      "name": "CVE-2022-49725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49725"
    },
    {
      "name": "CVE-2022-49730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49730"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-54683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
    },
    {
      "name": "CVE-2024-57924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
    },
    {
      "name": "CVE-2025-21635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
    },
    {
      "name": "CVE-2024-57980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
    },
    {
      "name": "CVE-2024-57981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2024-58009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
    },
    {
      "name": "CVE-2024-58017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
    },
    {
      "name": "CVE-2024-58063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
    },
    {
      "name": "CVE-2025-21735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
    },
    {
      "name": "CVE-2025-21750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2022-49139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
    },
    {
      "name": "CVE-2022-49205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
    },
    {
      "name": "CVE-2022-49325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49325"
    },
    {
      "name": "CVE-2022-49390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49390"
    },
    {
      "name": "CVE-2022-49465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
    },
    {
      "name": "CVE-2022-49658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
    },
    {
      "name": "CVE-2022-49753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49753"
    },
    {
      "name": "CVE-2023-53023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53023"
    },
    {
      "name": "CVE-2023-53026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
    },
    {
      "name": "CVE-2023-53033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
    },
    {
      "name": "CVE-2025-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
    },
    {
      "name": "CVE-2025-21909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
    },
    {
      "name": "CVE-2025-21910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
    },
    {
      "name": "CVE-2025-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
    },
    {
      "name": "CVE-2025-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
    },
    {
      "name": "CVE-2025-21914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
    },
    {
      "name": "CVE-2025-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
    },
    {
      "name": "CVE-2025-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
    },
    {
      "name": "CVE-2025-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
    },
    {
      "name": "CVE-2025-21922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
    },
    {
      "name": "CVE-2025-21924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
    },
    {
      "name": "CVE-2025-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
    },
    {
      "name": "CVE-2025-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
    },
    {
      "name": "CVE-2025-21936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
    },
    {
      "name": "CVE-2025-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
    },
    {
      "name": "CVE-2025-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
    },
    {
      "name": "CVE-2025-21950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
    },
    {
      "name": "CVE-2025-21951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
    },
    {
      "name": "CVE-2025-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
    },
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2023-53031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
    },
    {
      "name": "CVE-2025-21969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
    },
    {
      "name": "CVE-2025-21696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-21927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
    },
    {
      "name": "CVE-2025-22093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2024-28956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
    },
    {
      "name": "CVE-2025-21953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
    },
    {
      "name": "CVE-2020-36789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36789"
    },
    {
      "name": "CVE-2021-47668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47668"
    },
    {
      "name": "CVE-2021-47669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47669"
    },
    {
      "name": "CVE-2021-47670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47670"
    },
    {
      "name": "CVE-2021-47671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47671"
    },
    {
      "name": "CVE-2022-49110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49110"
    },
    {
      "name": "CVE-2022-49171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
    },
    {
      "name": "CVE-2022-49197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
    },
    {
      "name": "CVE-2022-49561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
    },
    {
      "name": "CVE-2022-49590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2022-49741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49741"
    },
    {
      "name": "CVE-2022-49745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49745"
    },
    {
      "name": "CVE-2022-49749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49749"
    },
    {
      "name": "CVE-2022-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49767"
    },
    {
      "name": "CVE-2023-52928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
    },
    {
      "name": "CVE-2023-52931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52931"
    },
    {
      "name": "CVE-2023-52936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52936"
    },
    {
      "name": "CVE-2023-52937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
    },
    {
      "name": "CVE-2023-52938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
    },
    {
      "name": "CVE-2023-52981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
    },
    {
      "name": "CVE-2023-52982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
    },
    {
      "name": "CVE-2023-52986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
    },
    {
      "name": "CVE-2023-52994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52994"
    },
    {
      "name": "CVE-2023-53001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53001"
    },
    {
      "name": "CVE-2023-53002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
    },
    {
      "name": "CVE-2023-53009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
    },
    {
      "name": "CVE-2023-53014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53014"
    },
    {
      "name": "CVE-2023-53018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53018"
    },
    {
      "name": "CVE-2023-53032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
    },
    {
      "name": "CVE-2023-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53051"
    },
    {
      "name": "CVE-2024-35840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35840"
    },
    {
      "name": "CVE-2024-58018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
    },
    {
      "name": "CVE-2024-58070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2024-58094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
    },
    {
      "name": "CVE-2024-58095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
    },
    {
      "name": "CVE-2024-58096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
    },
    {
      "name": "CVE-2024-58097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
    },
    {
      "name": "CVE-2025-21729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21729"
    },
    {
      "name": "CVE-2025-21755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
    },
    {
      "name": "CVE-2025-21833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21852"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
    },
    {
      "name": "CVE-2025-21884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
    },
    {
      "name": "CVE-2025-21889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
    },
    {
      "name": "CVE-2025-21894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
    },
    {
      "name": "CVE-2025-21895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
    },
    {
      "name": "CVE-2025-21906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
    },
    {
      "name": "CVE-2025-21908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
    },
    {
      "name": "CVE-2025-21915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
    },
    {
      "name": "CVE-2025-21923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21923"
    },
    {
      "name": "CVE-2025-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
    },
    {
      "name": "CVE-2025-21931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
    },
    {
      "name": "CVE-2025-21961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
    },
    {
      "name": "CVE-2025-21966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
    },
    {
      "name": "CVE-2025-21972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
    },
    {
      "name": "CVE-2025-21976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
    },
    {
      "name": "CVE-2025-21985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
    },
    {
      "name": "CVE-2025-21995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
    },
    {
      "name": "CVE-2025-22001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
    },
    {
      "name": "CVE-2025-22003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
    },
    {
      "name": "CVE-2025-22009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
    },
    {
      "name": "CVE-2025-22013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
    },
    {
      "name": "CVE-2025-22016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
    },
    {
      "name": "CVE-2025-22017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22029"
    },
    {
      "name": "CVE-2025-22036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22036"
    },
    {
      "name": "CVE-2025-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-22064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22064"
    },
    {
      "name": "CVE-2025-22065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22065"
    },
    {
      "name": "CVE-2025-22080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22080"
    },
    {
      "name": "CVE-2025-22090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
    },
    {
      "name": "CVE-2025-22102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
    },
    {
      "name": "CVE-2025-22104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
    },
    {
      "name": "CVE-2025-22105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
    },
    {
      "name": "CVE-2025-22106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
    },
    {
      "name": "CVE-2025-22107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
    },
    {
      "name": "CVE-2025-22108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22108"
    },
    {
      "name": "CVE-2025-22109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
    },
    {
      "name": "CVE-2025-22115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
    },
    {
      "name": "CVE-2025-22116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
    },
    {
      "name": "CVE-2025-22121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
    },
    {
      "name": "CVE-2025-22128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
    },
    {
      "name": "CVE-2025-23129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
    },
    {
      "name": "CVE-2025-23131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
    },
    {
      "name": "CVE-2025-23133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2025-37860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
    }
  ],
  "initial_release_date": "2025-05-23T00:00:00",
  "last_revision_date": "2025-05-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0449",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": "2025-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01627-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501627-1"
    },
    {
      "published_at": "2025-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01611-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501611-1"
    },
    {
      "published_at": "2025-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01614-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501614-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01656-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501656-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01652-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501652-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01668-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501668-1"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01601-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501601-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01682-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501682-1"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01590-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501590-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01676-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501676-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01655-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501655-1"
    },
    {
      "published_at": "2025-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01620-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501620-1"
    },
    {
      "published_at": "2025-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01633-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501633-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01672-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501672-1"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01593-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501593-1"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01600-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501600-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01675-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501675-1"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01603-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501603-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01669-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501669-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01677-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501677-1"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1574-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251574-1"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01598-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501598-1"
    },
    {
      "published_at": "2025-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01640-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501640-1"
    },
    {
      "published_at": "2025-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01610-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501610-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01683-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501683-1"
    },
    {
      "published_at": "2025-05-22",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01663-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501663-1"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1573-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251573-1"
    }
  ]
}
  CERTFR-2025-AVI-0721
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 20.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 24.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 22.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2025-38043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
    },
    {
      "name": "CVE-2025-21783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
    },
    {
      "name": "CVE-2025-21786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
    },
    {
      "name": "CVE-2025-38002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38002"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-37965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37965"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2024-49950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49950"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-37961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
    },
    {
      "name": "CVE-2025-38061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-38004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
    },
    {
      "name": "CVE-2025-38016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38016"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-21746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
    },
    {
      "name": "CVE-2025-38066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-38022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
    },
    {
      "name": "CVE-2025-38068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-37971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37971"
    },
    {
      "name": "CVE-2025-21868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
    },
    {
      "name": "CVE-2025-38056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38056"
    },
    {
      "name": "CVE-2025-38027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-37993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37993"
    },
    {
      "name": "CVE-2025-37955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37955"
    },
    {
      "name": "CVE-2025-38015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
    },
    {
      "name": "CVE-2025-37958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-38065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
    },
    {
      "name": "CVE-2025-38031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
    },
    {
      "name": "CVE-2025-37950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37950"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-38008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
    },
    {
      "name": "CVE-2025-38011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-38025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38025"
    },
    {
      "name": "CVE-2025-38034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
    },
    {
      "name": "CVE-2025-38095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2025-38078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2025-38077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-38014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
    },
    {
      "name": "CVE-2025-38003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
    },
    {
      "name": "CVE-2025-38007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-38079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-37999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37999"
    },
    {
      "name": "CVE-2025-38018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-37952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
    },
    {
      "name": "CVE-2025-38012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38012"
    },
    {
      "name": "CVE-2025-38019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-38037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
    },
    {
      "name": "CVE-2025-37962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-37972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
    },
    {
      "name": "CVE-2025-38010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-38013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
    },
    {
      "name": "CVE-2025-37956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-38072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-38075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
    },
    {
      "name": "CVE-2025-38058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2025-37951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
    },
    {
      "name": "CVE-2025-37947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2025-37973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
    },
    {
      "name": "CVE-2025-37996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37996"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2025-37968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
    },
    {
      "name": "CVE-2025-38006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
    },
    {
      "name": "CVE-2025-38048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2024-54456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-21773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-38052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
    },
    {
      "name": "CVE-2025-38035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
    },
    {
      "name": "CVE-2025-37963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2025-37948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-37960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
    },
    {
      "name": "CVE-2025-38051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
    },
    {
      "name": "CVE-2025-37954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
    },
    {
      "name": "CVE-2025-38044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
    },
    {
      "name": "CVE-2025-37959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
    },
    {
      "name": "CVE-2025-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2023-52757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2023-52975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52975"
    },
    {
      "name": "CVE-2025-37966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37966"
    },
    {
      "name": "CVE-2025-38028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38028"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2025-38020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2025-38021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38021"
    }
  ],
  "initial_release_date": "2025-08-22T00:00:00",
  "last_revision_date": "2025-08-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0721",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-1",
      "url": "https://ubuntu.com/security/notices/USN-7704-1"
    },
    {
      "published_at": "2025-08-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7703-1",
      "url": "https://ubuntu.com/security/notices/USN-7703-1"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-4",
      "url": "https://ubuntu.com/security/notices/USN-7704-4"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-3",
      "url": "https://ubuntu.com/security/notices/USN-7704-3"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7701-3",
      "url": "https://ubuntu.com/security/notices/USN-7701-3"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7682-6",
      "url": "https://ubuntu.com/security/notices/USN-7682-6"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7703-2",
      "url": "https://ubuntu.com/security/notices/USN-7703-2"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7703-3",
      "url": "https://ubuntu.com/security/notices/USN-7703-3"
    },
    {
      "published_at": "2025-08-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7701-1",
      "url": "https://ubuntu.com/security/notices/USN-7701-1"
    },
    {
      "published_at": "2025-08-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-2",
      "url": "https://ubuntu.com/security/notices/USN-7704-2"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7699-2",
      "url": "https://ubuntu.com/security/notices/USN-7699-2"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7701-2",
      "url": "https://ubuntu.com/security/notices/USN-7701-2"
    }
  ]
}
  ssa-082556
Vulnerability from csaf_siemens
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1.5 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nSiemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
      },
      {
        "category": "self",
        "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-082556.json"
      }
    ],
    "title": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5",
    "tracking": {
      "current_release_date": "2025-08-12T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-082556",
      "initial_release_date": "2025-06-10T00:00:00Z",
      "revision_history": [
        {
          "date": "2025-06-10T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2025-08-12T00:00:00Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added CVE-2025-6395, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990"
        }
      ],
      "status": "interim",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)",
                  "product_id": "1",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)",
                  "product_id": "2",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)",
                  "product_id": "3",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)",
                  "product_id": "4",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)",
                  "product_id": "5",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6AG1518-4AX00-4AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-41617",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-41617"
    },
    {
      "cve": "CVE-2023-4527",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4527"
    },
    {
      "cve": "CVE-2023-4806",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4806"
    },
    {
      "cve": "CVE-2023-4911",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4911"
    },
    {
      "cve": "CVE-2023-5363",
      "cwe": {
        "id": "CWE-684",
        "name": "Incorrect Provision of Specified Functionality"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST\u0027s SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2023-6246",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6246"
    },
    {
      "cve": "CVE-2023-6779",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6779"
    },
    {
      "cve": "CVE-2023-6780",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6780"
    },
    {
      "cve": "CVE-2023-28531",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-28531"
    },
    {
      "cve": "CVE-2023-38545",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "cwe": {
        "id": "CWE-73",
        "name": "External Control of File Name or Path"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-46218",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51384",
      "cwe": {
        "id": "CWE-304",
        "name": "Missing Critical Step in Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-51384"
    },
    {
      "cve": "CVE-2023-51385",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-51385"
    },
    {
      "cve": "CVE-2023-52927",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the exp not to be removed when the created ct will not be confirmed, like in OVS and TC conntrack in the following patches. This patch allows exp not to be removed by setting IPS_CONFIRMED in the status of the tmpl.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52927"
    },
    {
      "cve": "CVE-2024-2961",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-6119",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don\u0027t perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-6119"
    },
    {
      "cve": "CVE-2024-6387",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A security regression (CVE-2006-5051) was discovered in OpenSSH\u0027s server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-12133",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-12133"
    },
    {
      "cve": "CVE-2024-12243",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-12243"
    },
    {
      "cve": "CVE-2024-24855",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A race condition was found in the Linux kernel\u0027s scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-24855"
    },
    {
      "cve": "CVE-2024-26596",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: dsa: netdev_priv() dereference before check on non-DSA netdevice events.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26596"
    },
    {
      "cve": "CVE-2024-28085",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-33599",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow.  This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference.  This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients.  The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34397",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-34397"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-45490",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-45490"
    },
    {
      "cve": "CVE-2024-45491",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-45491"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-50246",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/ntfs3: Add rough attr alloc_size check",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50246"
    },
    {
      "cve": "CVE-2024-53166",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "block, bfq: bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq from bic without the lock, this can lead to UAF if the io_context is shared by multiple tasks.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-53166"
    },
    {
      "cve": "CVE-2024-57977",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "memcg: A soft lockup vulnerability in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup was triggered.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-57977"
    },
    {
      "cve": "CVE-2024-57996",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net_sched: sch_sfq: vulnerability caused by incorrectly handling a packet limit of 1, leading to an array-index-out-of-bounds error and subsequent crash when the queue length is decremented for an empty slot.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-57996"
    },
    {
      "cve": "CVE-2024-58005",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "tpm: Change to kvalloc() in eventlog/acpi.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-58005"
    },
    {
      "cve": "CVE-2025-4373",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GLib is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-4373"
    },
    {
      "cve": "CVE-2025-4598",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\r\n\r\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-4598"
    },
    {
      "cve": "CVE-2025-6395",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-6395"
    },
    {
      "cve": "CVE-2025-21701",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: vulnerability arises because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, leading to potential use of destroyed locks, which is fixed by denying operations on devices being unregistered.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21701"
    },
    {
      "cve": "CVE-2025-21702",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21702"
    },
    {
      "cve": "CVE-2025-21712",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "md/md-bitmap: vulnerability caused by bitmap_get_stats() can be called even if the bitmap is destroyed or not fully initialized, leading to a kernel crash, which is fixed by synchronizing bitmap_get_stats() with bitmap_info.mutex.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21712"
    },
    {
      "cve": "CVE-2025-21724",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index(). Resolve a UBSAN shift-out-of-bounds issue in iova_bitmap_offset_to_index() where shifting the constant \"1\" (of type int) by bitmap-\u003emapped.pgshift (an unsigned long value) could result in undefined behavior. The constant \"1\" defaults to a 32-bit \"int\", and when \"pgshift\" exceeds 31 (e.g., pgshift = 63) the shift operation overflows, as the result cannot be represented in a 32-bit type.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21724"
    },
    {
      "cve": "CVE-2025-21728",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21728"
    },
    {
      "cve": "CVE-2025-21745",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix class @block_class\u0027s subsystem refcount leakage\r\n\r\nblkcg_fill_root_iostats() iterates over @block_class\u0027s devices by\r\nclass_dev_iter_(init|next)(), but does not end iterating with\r\nclass_dev_iter_exit(), so causes the class\u0027s subsystem refcount leakage.\r\n\r\nFix by ending the iterating with class_dev_iter_exit().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21745"
    },
    {
      "cve": "CVE-2025-21756",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21756"
    },
    {
      "cve": "CVE-2025-21758",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21758"
    },
    {
      "cve": "CVE-2025-21765",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21765"
    },
    {
      "cve": "CVE-2025-21766",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv4: use RCU protection in __ip_rt_update_pmtu(). __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21766"
    },
    {
      "cve": "CVE-2025-21767",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context The following bug report happened with a PREEMPT_RT kernel: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 get_random_u32+0x4f/0x110 clocksource_verify_choose_cpus+0xab/0x1a0 clocksource_verify_percpu.part.0+0x6b/0x330 clocksource_watchdog_kthread+0x193/0x1a0 It is due to the fact that clocksource_verify_choose_cpus() is invoked with preemption disabled. This function invokes get_random_u32() to obtain random numbers for choosing CPUs. The batched_entropy_32 local lock and/or the base_crng.lock spinlock in driver/char/random.c will be acquired during the call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot be acquired in atomic context. Fix this problem by using migrate_disable() to allow smp_processor_id() to be reliably used without introducing atomic context. preempt_disable() is then called after clocksource_verify_choose_cpus() but before the clocksource measurement is being run to avoid introducing unexpected latency.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21767"
    },
    {
      "cve": "CVE-2025-21795",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "NFSD: hang in nfsd4_shutdown_callback. If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21795"
    },
    {
      "cve": "CVE-2025-21796",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nfsd: clear acl_access/acl_default after releasing them If getting acl_default fails, acl_access and acl_default will be released simultaneously.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21796"
    },
    {
      "cve": "CVE-2025-21848",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfp: bpf: Add check for nfp_app_ctrl_msg_alloc()\r\n\r\nAdd check for the return value of nfp_app_ctrl_msg_alloc() in\r\nnfp_bpf_cmsg_alloc() to prevent null pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21848"
    },
    {
      "cve": "CVE-2025-21862",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "drop_monitor: incorrect initialization order. If drop_monitor is built as a kernel module, syzkaller may have time to send a netlink NET_DM_CMD_START message during the module loading. This will call the net_dm_monitor_start() function that uses a spinlock that has not yet been initialized.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21862"
    },
    {
      "cve": "CVE-2025-21864",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: drop secpath at the same time as we currently drop dst\r\n\r\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\r\nrunning tests that boil down to:\r\n - create a pair of netns\r\n - run a basic TCP test over ipcomp6\r\n - delete the pair of netns\r\n\r\nThe xfrm_state found on spi_byaddr was not deleted at the time we\r\ndelete the netns, because we still have a reference on it. This\r\nlingering reference comes from a secpath (which holds a ref on the\r\nxfrm_state), which is still attached to an skb. This skb is not\r\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\r\nskb_attempt_defer_free.\r\n\r\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\r\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\r\nthat case, we still have a reference on the xfrm_state that we don\u0027t\r\nexpect at this point.\r\n\r\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\r\nlonger needed, so let\u0027s also drop the secpath. At this point,\r\ntcp_filter has already called into the LSM hooks that may require the\r\nsecpath, so it should not be needed anymore. However, in some of those\r\nplaces, the MPTCP extension has just been attached to the skb, so we\r\ncannot simply drop all extensions.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21864"
    },
    {
      "cve": "CVE-2025-21865",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Commit eb28fd76c0a0 (\"gtp: Destroy device along with udp socket\u0027s netns dismantle.\") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl() to destroy devices in each netns as done in geneve and ip tunnels. However, this could trigger -\u003edellink() twice for the same device during -\u003eexit_batch_rtnl().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21865"
    },
    {
      "cve": "CVE-2025-26465",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-26465"
    },
    {
      "cve": "CVE-2025-31115",
      "cwe": {
        "id": "CWE-826",
        "name": "Premature Release of Resource During Expected Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The threaded .xz decoder in liblzma has a vulnerability that can at least result in a crash (denial of service). The effects include heap use after free and writing to an address based on the null pointer plus an offset.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-31115"
    },
    {
      "cve": "CVE-2025-32988",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-32988"
    },
    {
      "cve": "CVE-2025-32989",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-32989"
    },
    {
      "cve": "CVE-2025-46836",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net-tools is a collection of programs that form the base set of the NET-3 networking distribution for the Linux operating system. Inn versions up to and including 2.10, the Linux network utilities (like ifconfig) from the net-tools package do not properly validate the structure of /proc files when showing interfaces. `get_name()` in `interface.c` copies interface labels from `/proc/net/dev` into a fixed 16-byte stack buffer without bounds checking, leading to possible arbitrary code execution or crash. The known attack path does not require privilege but also does not provide privilege escalation in this scenario. A patch is available and expected to be part of version 2.20.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-46836"
    }
  ]
}
  fkie_cve-2025-21758
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1 | Patch | 
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F480B9F-DE53-45AC-B511-DB94780AEC99",
              "versionEndExcluding": "5.15.179",
              "versionStartIncluding": "2.6.26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DA5009C-C9B9-4A1D-9B96-78427E8F232C",
              "versionEndExcluding": "6.1.129",
              "versionStartIncluding": "5.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B16AADE5-B2FD-4C14-B4E4-85E8EDAFE775",
              "versionEndExcluding": "6.6.79",
              "versionStartIncluding": "6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C8DB18-FC60-425F-84E5-3EDDEC61B2FC",
              "versionEndExcluding": "6.12.16",
              "versionStartIncluding": "6.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A2093ED-74A9-43F9-AC72-50030F374EA4",
              "versionEndExcluding": "6.13.4",
              "versionStartIncluding": "6.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: mcast: add RCU protection to mld_newpack()\n\nmld_newpack() can be called without RTNL or RCU being held.\n\nNote that we no longer can use sock_alloc_send_skb() because\nipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.\n\nInstead use alloc_skb() and charge the net-\u003eipv6.igmp_sk\nsocket under RCU protection."
    },
    {
      "lang": "es",
      "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: mcast: agregar protecci\u00f3n RCU a mld_newpack() mld_newpack() se puede llamar sin que se mantenga RTNL o RCU. Tenga en cuenta que ya no podemos usar sock_alloc_send_skb() porque ipv6.igmp_sk usa asignaciones GFP_KERNEL que pueden dormir. En su lugar, use alloc_skb() y cargue el socket net-\u0026gt;ipv6.igmp_sk bajo la protecci\u00f3n RCU."
    }
  ],
  "id": "CVE-2025-21758",
  "lastModified": "2025-10-28T20:50:15.913",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-02-27T03:15:16.450",
  "references": [
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1"
    }
  ],
  "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  icsa-25-162-05
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting these vulnerabilities to CISA."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1.5 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nSiemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-082556 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory.  Further, CISA does not endorse any commercial product or service.  Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-082556.json"
      },
      {
        "category": "self",
        "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-25-162-05 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-162-05.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-25-162-05 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5",
    "tracking": {
      "current_release_date": "2025-08-12T00:00:00.000000Z",
      "generator": {
        "date": "2025-08-14T23:08:52.425782Z",
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-25-162-05",
      "initial_release_date": "2025-06-10T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2025-06-10T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2025-08-12T00:00:00.000000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added CVE-2025-6395, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)",
                  "product_id": "CSAFPID-0001",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)",
                  "product_id": "CSAFPID-0002",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)",
                  "product_id": "CSAFPID-0003",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)",
                  "product_id": "CSAFPID-0004",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)",
                  "product_id": "CSAFPID-0005",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6AG1518-4AX00-4AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-41617",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-41617"
    },
    {
      "cve": "CVE-2023-4527",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4527"
    },
    {
      "cve": "CVE-2023-4806",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4806"
    },
    {
      "cve": "CVE-2023-4911",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4911"
    },
    {
      "cve": "CVE-2023-5363",
      "cwe": {
        "id": "CWE-684",
        "name": "Incorrect Provision of Specified Functionality"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST\u0027s SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2023-6246",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6246"
    },
    {
      "cve": "CVE-2023-6779",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6779"
    },
    {
      "cve": "CVE-2023-6780",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6780"
    },
    {
      "cve": "CVE-2023-28531",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-28531"
    },
    {
      "cve": "CVE-2023-38545",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "cwe": {
        "id": "CWE-73",
        "name": "External Control of File Name or Path"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-46218",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51384",
      "cwe": {
        "id": "CWE-304",
        "name": "Missing Critical Step in Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-51384"
    },
    {
      "cve": "CVE-2023-51385",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-51385"
    },
    {
      "cve": "CVE-2023-52927",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the exp not to be removed when the created ct will not be confirmed, like in OVS and TC conntrack in the following patches. This patch allows exp not to be removed by setting IPS_CONFIRMED in the status of the tmpl.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52927"
    },
    {
      "cve": "CVE-2024-2961",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-6119",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don\u0027t perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-6119"
    },
    {
      "cve": "CVE-2024-6387",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A security regression (CVE-2006-5051) was discovered in OpenSSH\u0027s server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-12133",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-12133"
    },
    {
      "cve": "CVE-2024-12243",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-12243"
    },
    {
      "cve": "CVE-2024-24855",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A race condition was found in the Linux kernel\u0027s scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-24855"
    },
    {
      "cve": "CVE-2024-26596",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: dsa: netdev_priv() dereference before check on non-DSA netdevice events.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26596"
    },
    {
      "cve": "CVE-2024-28085",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-33599",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow.  This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference.  This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients.  The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34397",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-34397"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-45490",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-45490"
    },
    {
      "cve": "CVE-2024-45491",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-45491"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-50246",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/ntfs3: Add rough attr alloc_size check",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50246"
    },
    {
      "cve": "CVE-2024-53166",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "block, bfq: bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq from bic without the lock, this can lead to UAF if the io_context is shared by multiple tasks.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-53166"
    },
    {
      "cve": "CVE-2024-57977",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "memcg: A soft lockup vulnerability in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup was triggered.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-57977"
    },
    {
      "cve": "CVE-2024-57996",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net_sched: sch_sfq: vulnerability caused by incorrectly handling a packet limit of 1, leading to an array-index-out-of-bounds error and subsequent crash when the queue length is decremented for an empty slot.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-57996"
    },
    {
      "cve": "CVE-2024-58005",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "tpm: Change to kvalloc() in eventlog/acpi.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-58005"
    },
    {
      "cve": "CVE-2025-4373",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GLib is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-4373"
    },
    {
      "cve": "CVE-2025-4598",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\r\n\r\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-4598"
    },
    {
      "cve": "CVE-2025-6395",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-6395"
    },
    {
      "cve": "CVE-2025-21701",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: vulnerability arises because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, leading to potential use of destroyed locks, which is fixed by denying operations on devices being unregistered.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21701"
    },
    {
      "cve": "CVE-2025-21702",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21702"
    },
    {
      "cve": "CVE-2025-21712",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "md/md-bitmap: vulnerability caused by bitmap_get_stats() can be called even if the bitmap is destroyed or not fully initialized, leading to a kernel crash, which is fixed by synchronizing bitmap_get_stats() with bitmap_info.mutex.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21712"
    },
    {
      "cve": "CVE-2025-21724",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index(). Resolve a UBSAN shift-out-of-bounds issue in iova_bitmap_offset_to_index() where shifting the constant \"1\" (of type int) by bitmap-\u003emapped.pgshift (an unsigned long value) could result in undefined behavior. The constant \"1\" defaults to a 32-bit \"int\", and when \"pgshift\" exceeds 31 (e.g., pgshift = 63) the shift operation overflows, as the result cannot be represented in a 32-bit type.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21724"
    },
    {
      "cve": "CVE-2025-21728",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21728"
    },
    {
      "cve": "CVE-2025-21745",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix class @block_class\u0027s subsystem refcount leakage\r\n\r\nblkcg_fill_root_iostats() iterates over @block_class\u0027s devices by\r\nclass_dev_iter_(init|next)(), but does not end iterating with\r\nclass_dev_iter_exit(), so causes the class\u0027s subsystem refcount leakage.\r\n\r\nFix by ending the iterating with class_dev_iter_exit().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21745"
    },
    {
      "cve": "CVE-2025-21756",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21756"
    },
    {
      "cve": "CVE-2025-21758",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21758"
    },
    {
      "cve": "CVE-2025-21765",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21765"
    },
    {
      "cve": "CVE-2025-21766",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv4: use RCU protection in __ip_rt_update_pmtu(). __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21766"
    },
    {
      "cve": "CVE-2025-21767",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context The following bug report happened with a PREEMPT_RT kernel: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 get_random_u32+0x4f/0x110 clocksource_verify_choose_cpus+0xab/0x1a0 clocksource_verify_percpu.part.0+0x6b/0x330 clocksource_watchdog_kthread+0x193/0x1a0 It is due to the fact that clocksource_verify_choose_cpus() is invoked with preemption disabled. This function invokes get_random_u32() to obtain random numbers for choosing CPUs. The batched_entropy_32 local lock and/or the base_crng.lock spinlock in driver/char/random.c will be acquired during the call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot be acquired in atomic context. Fix this problem by using migrate_disable() to allow smp_processor_id() to be reliably used without introducing atomic context. preempt_disable() is then called after clocksource_verify_choose_cpus() but before the clocksource measurement is being run to avoid introducing unexpected latency.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21767"
    },
    {
      "cve": "CVE-2025-21795",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "NFSD: hang in nfsd4_shutdown_callback. If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21795"
    },
    {
      "cve": "CVE-2025-21796",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nfsd: clear acl_access/acl_default after releasing them If getting acl_default fails, acl_access and acl_default will be released simultaneously.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21796"
    },
    {
      "cve": "CVE-2025-21848",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfp: bpf: Add check for nfp_app_ctrl_msg_alloc()\r\n\r\nAdd check for the return value of nfp_app_ctrl_msg_alloc() in\r\nnfp_bpf_cmsg_alloc() to prevent null pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21848"
    },
    {
      "cve": "CVE-2025-21862",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "drop_monitor: incorrect initialization order. If drop_monitor is built as a kernel module, syzkaller may have time to send a netlink NET_DM_CMD_START message during the module loading. This will call the net_dm_monitor_start() function that uses a spinlock that has not yet been initialized.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21862"
    },
    {
      "cve": "CVE-2025-21864",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: drop secpath at the same time as we currently drop dst\r\n\r\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\r\nrunning tests that boil down to:\r\n - create a pair of netns\r\n - run a basic TCP test over ipcomp6\r\n - delete the pair of netns\r\n\r\nThe xfrm_state found on spi_byaddr was not deleted at the time we\r\ndelete the netns, because we still have a reference on it. This\r\nlingering reference comes from a secpath (which holds a ref on the\r\nxfrm_state), which is still attached to an skb. This skb is not\r\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\r\nskb_attempt_defer_free.\r\n\r\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\r\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\r\nthat case, we still have a reference on the xfrm_state that we don\u0027t\r\nexpect at this point.\r\n\r\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\r\nlonger needed, so let\u0027s also drop the secpath. At this point,\r\ntcp_filter has already called into the LSM hooks that may require the\r\nsecpath, so it should not be needed anymore. However, in some of those\r\nplaces, the MPTCP extension has just been attached to the skb, so we\r\ncannot simply drop all extensions.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21864"
    },
    {
      "cve": "CVE-2025-21865",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Commit eb28fd76c0a0 (\"gtp: Destroy device along with udp socket\u0027s netns dismantle.\") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl() to destroy devices in each netns as done in geneve and ip tunnels. However, this could trigger -\u003edellink() twice for the same device during -\u003eexit_batch_rtnl().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21865"
    },
    {
      "cve": "CVE-2025-26465",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-26465"
    },
    {
      "cve": "CVE-2025-31115",
      "cwe": {
        "id": "CWE-826",
        "name": "Premature Release of Resource During Expected Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The threaded .xz decoder in liblzma has a vulnerability that can at least result in a crash (denial of service). The effects include heap use after free and writing to an address based on the null pointer plus an offset.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-31115"
    },
    {
      "cve": "CVE-2025-32988",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-32988"
    },
    {
      "cve": "CVE-2025-32989",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-32989"
    },
    {
      "cve": "CVE-2025-46836",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net-tools is a collection of programs that form the base set of the NET-3 networking distribution for the Linux operating system. Inn versions up to and including 2.10, the Linux network utilities (like ifconfig) from the net-tools package do not properly validate the structure of /proc files when showing interfaces. `get_name()` in `interface.c` copies interface labels from `/proc/net/dev` into a fixed 16-byte stack buffer without bounds checking, leading to possible arbitrary code execution or crash. The known attack path does not require privilege but also does not provide privilege escalation in this scenario. A patch is available and expected to be part of version 2.20.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-46836"
    }
  ]
}
  wid-sec-w-2025-0453
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2025-0453 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0453.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2025-0453 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0453"
      },
      {
        "category": "external",
        "summary": "Kernel CVE Announce Mailingliste",
        "url": "https://lore.kernel.org/linux-cve-announce/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2022-49732",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49732-fc0d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-49570",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2024-49570-d2e7@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-52557",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-52557-506d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-52559",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-52559-6125@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-52560",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-52560-8446@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-54456",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-54456-e8a9@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-54458",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-54458-75cd@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57834",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-57834-f004@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57852",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2024-57852-f942@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57953",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022631-CVE-2024-57953-9830@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57973",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022632-CVE-2024-57973-8797@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57974",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022632-CVE-2024-57974-189e@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57975",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2024-57975-e1c7@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57976",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2024-57976-10f5@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57977",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2024-57977-88ac@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57978",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022634-CVE-2024-57978-2a90@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57979",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022634-CVE-2024-57979-aad0@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57980",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022634-CVE-2024-57980-4b5a@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57981",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022635-CVE-2024-57981-bba6@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57982",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022635-CVE-2024-57982-c76a@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57983",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022635-CVE-2024-57983-d9c0@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57984",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022636-CVE-2024-57984-191f@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57985",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022636-CVE-2024-57985-1f49@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57986",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022636-CVE-2024-57986-6166@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57987",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2024-57987-09a3@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57988",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2024-57988-db3b@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57989",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2024-57989-0a14@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57990",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2024-57990-67dc@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57991",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2024-57991-a3e1@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57992",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2024-57992-fa9c@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57993",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2024-57993-e136@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57994",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2024-57994-8dbd@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57995",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2024-57995-892d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57996",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2024-57996-b670@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57997",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2024-57997-a004@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57998",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022641-CVE-2024-57998-e730@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-57999",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022641-CVE-2024-57999-1029@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58000",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2024-58000-4f74@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58001",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022654-CVE-2024-58001-3f9c@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58002",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022654-CVE-2024-58002-6f93@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58003",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58003-2b9b@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58004",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58004-cf99@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58005",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58005-f2fa@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58006",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58006-9855@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58007",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58007-123c@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58008",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58008-548d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58009",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58009-b2d2@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58010",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58010-39bc@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58011",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58011-5ed8@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58012",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58012-90ce@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58013",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58013-55de@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58014",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58014-6269@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58015",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58015-f72e@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58016",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58016-115b@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58017",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58017-fb48@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58018",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58018-605c@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58019",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2024-58019-64da@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58020",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2024-58020-a097@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58021",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2024-58021-0769@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21705",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2025-21705-c7e5@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21706",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2025-21706-f5bd@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21707",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022643-CVE-2025-21707-2961@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21708",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022643-CVE-2025-21708-77ac@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21709",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022643-CVE-2025-21709-e967@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21710",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022644-CVE-2025-21710-5e28@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21711",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022644-CVE-2025-21711-9e79@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21712",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022644-CVE-2025-21712-8345@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21713",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2025-21713-4c72@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21714",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2025-21714-8169@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21715",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2025-21715-2837@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21716",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2025-21716-3afa@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21717",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2025-21717-3893@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21718",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2025-21718-d976@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21719",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2025-21719-dbee@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21720",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21720-063a@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21721",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21721-28d2@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21722",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21722-5415@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21723",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21723-9f05@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21724",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21724-f4b1@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21725",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21725-3a4d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21726",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21726-73b1@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21727",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21728",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21728-5da4@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21729",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21729-24e3@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21730",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21730-5bfb@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21731",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022649-CVE-2025-21731-c18b@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21732",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2025-21732-e800@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21733",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2025-21733-f0b8@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21734",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2025-21734-ac40@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21735",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2025-21735-259b@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21736",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21736-6d94@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21737",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21737-db6e@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21738",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21738-f502@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21739",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21739-5578@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21740",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21740-083e@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21741",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21741-cbfd@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21742",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21742-7d50@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21743",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21743-c67f@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21744",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21744-2585@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21745",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21745-19ee@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21746",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21746-380d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21747",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21747-a514@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21748",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21748-c980@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21749",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21749-cd11@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21750",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21750-d10d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21751",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21751-101c@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21752",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2025-21752-5815@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21753",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2025-21753-91bd@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21754",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2025-21754-9daa@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21755",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2025-21755-5887@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21756",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2025-21756-5e09@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21757",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2025-21757-912a@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21758",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21758-9f8c@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21759",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21759-ad7c@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21760",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21760-fb9d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21761",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21761-218b@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21762",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21762-8b8d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21763",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21763-dcff@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21764",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21764-1061@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21765",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21765-4d5e@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21766",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21766-a004@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21767",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21767-4c7f@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21768",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21768-512b@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21769",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21769-c349@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21770",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21770-d7e0@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21771",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21771-6032@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21772",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21772-5ec0@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21773",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21773-2ee7@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21774",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21774-26d5@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21775",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21775-3137@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21776",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21776-5581@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21777",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21777-0c96@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21778",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21778-9ae4@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21779",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21779-f239@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21780",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21780-8283@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21781",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21781-7324@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21782",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21782-9d97@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21783",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21783-2714@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21784",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21784-cd4e@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21785",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21785-184c@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21786",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21786-f31d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21787",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21787-c4f2@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21788",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21788-2619@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21789",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21789-9691@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21790",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21790-af3e@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21791",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21791-6074@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21792",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21792-d8e8@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21793",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21793-2c1e@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21794",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21794-ddde@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21795",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21795-785d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21796",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21796-0133@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21797",
        "url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21797-04ee@gregkh/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:2474 vom 2025-03-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:2474"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-2473 vom 2025-03-11",
        "url": "https://linux.oracle.com/errata/ELSA-2025-2473.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:2710 vom 2025-03-20",
        "url": "https://access.redhat.com/errata/RHSA-2025:2710"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0983-1 vom 2025-03-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3128 vom 2025-03-25",
        "url": "https://access.redhat.com/errata/RHSA-2025:3128"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3127 vom 2025-03-25",
        "url": "https://access.redhat.com/errata/RHSA-2025:3127"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3208 vom 2025-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:3208"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3212 vom 2025-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:3212"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3214 vom 2025-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:3214"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3213 vom 2025-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:3213"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3207 vom 2025-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:3207"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3211 vom 2025-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:3211"
      },
      {
        "category": "external",
        "summary": "RedHat Security Advisory",
        "url": "https://access.redhat.com/errata/RHSA-2025:3216"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3209 vom 2025-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:3209"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-3208 vom 2025-03-27",
        "url": "https://linux.oracle.com/errata/ELSA-2025-3208.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3264 vom 2025-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:3264"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:3260 vom 2025-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:3260"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1027-1 vom 2025-03-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-3260 vom 2025-03-27",
        "url": "https://linux.oracle.com/errata/ELSA-2025-3260.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-4102 vom 2025-04-01",
        "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-069 vom 2025-04-01",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-069.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-097 vom 2025-04-01",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-097.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
        "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1263-1 vom 2025-04-15",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q4U3LRNKLFTX56NC6NKHFDU35E5WDD75/"
      },
      {
        "category": "external",
        "summary": "Container-Optimized OS release notes vom 2025-04-16",
        "url": "https://cloud.google.com/container-optimized-os/docs/release-notes#April_14_2025"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-218 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-218.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-220 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-220.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-088 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-088.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-215 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-215.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-219 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-219.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-214 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-214.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-211 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-211.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-212 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-212.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-213 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-213.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-217 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-217.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-216 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-216.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17",
        "url": "https://alas.aws.amazon.com/ALAS-2025-1970.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7445-1 vom 2025-04-23",
        "url": "https://ubuntu.com/security/notices/USN-7445-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23",
        "url": "https://ubuntu.com/security/notices/USN-7452-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23",
        "url": "https://ubuntu.com/security/notices/USN-7449-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23",
        "url": "https://ubuntu.com/security/notices/USN-7451-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7448-1 vom 2025-04-23",
        "url": "https://ubuntu.com/security/notices/USN-7448-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23",
        "url": "https://ubuntu.com/security/notices/USN-7450-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23",
        "url": "https://ubuntu.com/security/notices/USN-7453-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7455-1 vom 2025-04-24",
        "url": "https://ubuntu.com/security/notices/USN-7455-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7455-2 vom 2025-04-24",
        "url": "https://ubuntu.com/security/notices/USN-7455-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24",
        "url": "https://ubuntu.com/security/notices/USN-7459-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7460-1 vom 2025-04-24",
        "url": "https://ubuntu.com/security/notices/USN-7460-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24",
        "url": "https://ubuntu.com/security/notices/USN-7449-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7455-3 vom 2025-04-24",
        "url": "https://ubuntu.com/security/notices/USN-7455-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7455-4 vom 2025-04-25",
        "url": "https://ubuntu.com/security/notices/USN-7455-4"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7231915 vom 2025-04-26",
        "url": "https://www.ibm.com/support/pages/node/7231915"
      },
      {
        "category": "external",
        "summary": "PoC CVE-2025-21756 vom 2025-04-28",
        "url": "https://github.com/hoefler02/CVE-2025-21756"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28",
        "url": "https://ubuntu.com/security/notices/USN-7459-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28",
        "url": "https://ubuntu.com/security/notices/USN-7468-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7455-5 vom 2025-04-29",
        "url": "https://ubuntu.com/security/notices/USN-7455-5"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-225 vom 2025-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-225.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-224 vom 2025-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-224.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-098 vom 2025-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-098.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7475-1 vom 2025-05-02",
        "url": "https://ubuntu.com/security/notices/USN-7475-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7423 vom 2025-05-13",
        "url": "https://access.redhat.com/errata/RHSA-2025:7423"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7652 vom 2025-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2025:7652"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7682 vom 2025-05-16",
        "url": "https://access.redhat.com/errata/RHSA-2025:7682"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7676 vom 2025-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2025:7676"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7683 vom 2025-05-16",
        "url": "https://access.redhat.com/errata/RHSA-2025:7683"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1574-1 vom 2025-05-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7510-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7903 vom 2025-05-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:7903"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7516-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7897 vom 2025-05-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:7897"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7901 vom 2025-05-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:7901"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1573-1 vom 2025-05-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7896 vom 2025-05-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:7896"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:7902 vom 2025-05-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:7902"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7511-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7511-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7512-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7510-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7517-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7518-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7516-3"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7510-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7523-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8057 vom 2025-05-21",
        "url": "https://access.redhat.com/errata/RHSA-2025:8057"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8056 vom 2025-05-21",
        "url": "https://access.redhat.com/errata/RHSA-2025:8056"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7510-4"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7511-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7510-5"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7521-1 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7521-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8058 vom 2025-05-21",
        "url": "https://access.redhat.com/errata/RHSA-2025:8058"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01627-1 vom 2025-05-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020866.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
        "url": "https://ubuntu.com/security/notices/USN-7516-4"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-8056 vom 2025-05-22",
        "url": "https://linux.oracle.com/errata/ELSA-2025-8056.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01633-1 vom 2025-05-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020864.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
        "url": "https://ubuntu.com/security/notices/USN-7517-2"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7521-2 vom 2025-05-22",
        "url": "https://ubuntu.com/security/notices/USN-7521-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
        "url": "https://ubuntu.com/security/notices/USN-7516-5"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-7423 vom 2025-05-23",
        "url": "https://linux.oracle.com/errata/ELSA-2025-7423.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-7903 vom 2025-05-23",
        "url": "https://linux.oracle.com/errata/ELSA-2025-7903.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8137 vom 2025-05-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:8137"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
        "url": "https://ubuntu.com/security/notices/USN-7516-6"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
        "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
        "url": "https://ubuntu.com/security/notices/USN-7517-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
        "url": "https://ubuntu.com/security/notices/USN-7524-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
        "url": "https://ubuntu.com/security/notices/USN-7510-6"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8248 vom 2025-05-28",
        "url": "https://access.redhat.com/errata/RHSA-2025:8248"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
        "url": "https://ubuntu.com/security/notices/USN-7539-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
        "url": "https://ubuntu.com/security/notices/USN-7510-7"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
        "url": "https://ubuntu.com/security/notices/USN-7540-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7521-3 vom 2025-05-28",
        "url": "https://ubuntu.com/security/notices/USN-7521-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
        "url": "https://ubuntu.com/security/notices/USN-7510-8"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
        "url": "https://ubuntu.com/security/notices/USN-7516-7"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
        "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
        "url": "https://ubuntu.com/security/notices/USN-7516-9"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
        "url": "https://ubuntu.com/security/notices/USN-7516-8"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2025-2865 vom 2025-05-29",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2865.html"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30",
        "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8345 vom 2025-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:8345"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8347 vom 2025-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:8347"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8346 vom 2025-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:8346"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8342 vom 2025-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:8342"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8344 vom 2025-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:8344"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8333 vom 2025-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:8333"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8343 vom 2025-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:8343"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8348 vom 2025-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:8348"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-8333 vom 2025-06-03",
        "url": "https://linux.oracle.com/errata/ELSA-2025-8333.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01844-1 vom 2025-06-09",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021438.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01843-1 vom 2025-06-09",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021432.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01839-1 vom 2025-06-09",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021433.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01840-1 vom 2025-06-09",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021434.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2025-1983 vom 2025-06-10",
        "url": "https://alas.aws.amazon.com/ALAS-2025-1983.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01849-1 vom 2025-06-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021443.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01853-1 vom 2025-06-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021441.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01851-1 vom 2025-06-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021442.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01869-1 vom 2025-06-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021449.html"
      },
      {
        "category": "external",
        "summary": "Siemens Security Advisory SSA-082556 vom 2025-06-10",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01868-1 vom 2025-06-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021447.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01875-1 vom 2025-06-11",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MS3XXVHXB3HEZP3HNHCCJLMN3IGQ7UNZ/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01873-1 vom 2025-06-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021451.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01892-1 vom 2025-06-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021465.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01901-1 vom 2025-06-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021471.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01893-1 vom 2025-06-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021468.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01894-1 vom 2025-06-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021467.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01899-1 vom 2025-06-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021466.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01908-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021473.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01907-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021474.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01906-1 vom 2025-06-12",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/555WAYKDPARZFWYJBA7IPHKL7OLUGFCD/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01927-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021493.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20381-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021488.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01929-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021498.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01930-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021497.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20387-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021482.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01928-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021499.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20388-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021481.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01922-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021479.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20386-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021483.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20382-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021487.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20383-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021486.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20389-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021480.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20384-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021485.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01935-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021500.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01932-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021501.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01950-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021510.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01944-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021505.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01958-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021516.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01957-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021517.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01948-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021512.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01949-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021511.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01956-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021518.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20402-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021520.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20401-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021521.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20400-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021522.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20399-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021523.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20398-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021524.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20397-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021525.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9079 vom 2025-06-16",
        "url": "https://access.redhat.com/errata/RHSA-2025:9079"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01965-1 vom 2025-06-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20408-1 vom 2025-06-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021550.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02000-1 vom 2025-06-18",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021568.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20419-1 vom 2025-06-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021591.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
        "url": "https://ubuntu.com/security/notices/USN-7593-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9497 vom 2025-06-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:9497"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9492 vom 2025-06-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:9492"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9493 vom 2025-06-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:9493"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9494 vom 2025-06-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:9494"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9490 vom 2025-06-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:9490"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9498 vom 2025-06-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:9498"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9491 vom 2025-06-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:9491"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9581 vom 2025-06-25",
        "url": "https://access.redhat.com/errata/RHSA-2025:9581"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9580 vom 2025-06-25",
        "url": "https://access.redhat.com/errata/RHSA-2025:9580"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25",
        "url": "https://access.redhat.com/errata/RHSA-2025:9584"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-9580 vom 2025-06-26",
        "url": "https://linux.oracle.com/errata/ELSA-2025-9580.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
        "url": "https://ubuntu.com/security/notices/USN-7602-1"
      },
      {
        "category": "external",
        "summary": "SEM 2025.2.1 release notes vom 2025-07-02",
        "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:10211 vom 2025-07-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:10211"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-9079 vom 2025-07-04",
        "url": "https://linux.oracle.com/errata/ELSA-2025-9079.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-8137 vom 2025-07-04",
        "url": "https://linux.oracle.com/errata/ELSA-2025-8137.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:10371 vom 2025-07-07",
        "url": "https://access.redhat.com/errata/RHSA-2025:10371"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:10379 vom 2025-07-07",
        "url": "https://access.redhat.com/errata/RHSA-2025:10379"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-10371 vom 2025-07-08",
        "url": "https://linux.oracle.com/errata/ELSA-2025-10371.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
        "url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-10379 vom 2025-07-08",
        "url": "https://linux.oracle.com/errata/ELSA-2025-10379.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-082 vom 2025-07-10",
        "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-082.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:10830 vom 2025-07-14",
        "url": "https://access.redhat.com/errata/RHSA-2025:10830"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:10829 vom 2025-07-14",
        "url": "https://access.redhat.com/errata/RHSA-2025:10829"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html"
      },
      {
        "category": "external",
        "summary": "RedHat Security Advisory",
        "url": "https://access.redhat.com/errata/RHSA-2025:11299"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11298 vom 2025-07-16",
        "url": "https://access.redhat.com/errata/RHSA-2025:11298"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11245 vom 2025-07-16",
        "url": "https://access.redhat.com/errata/RHSA-2025:11245"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
        "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-11298 vom 2025-07-17",
        "url": "https://linux.oracle.com/errata/ELSA-2025-11298.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
        "url": "https://ubuntu.com/security/notices/USN-7640-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17",
        "url": "https://ubuntu.com/security/notices/USN-7653-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7652-1 vom 2025-07-17",
        "url": "https://ubuntu.com/security/notices/USN-7652-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7651-1 vom 2025-07-17",
        "url": "https://ubuntu.com/security/notices/USN-7651-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
        "url": "https://ubuntu.com/security/notices/USN-7654-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
        "url": "https://ubuntu.com/security/notices/USN-7654-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
        "url": "https://ubuntu.com/security/notices/USN-7654-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
        "url": "https://ubuntu.com/security/notices/USN-7655-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7651-2 vom 2025-07-18",
        "url": "https://ubuntu.com/security/notices/USN-7651-2"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18",
        "url": "https://linux.oracle.com/errata/ELSA-2025-20480.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11411 vom 2025-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2025:11411"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02387-1 vom 2025-07-18",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021861.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02385-1 vom 2025-07-18",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021862.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02388-1 vom 2025-07-18",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021860.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02402-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021875.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02412-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021866.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02405-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021868.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02410-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7JYI4RKW2E7EB4ZJ6UB45TTF2H6PEYR/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11428 vom 2025-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2025:11428"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02399-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76DMKQMABVDV4KDJA6FQ7PDOF7RSG4ZQ/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02400-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFZK6V3WCARPDN2N3X7GFGJTK7UFSP6T/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02413-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021865.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02401-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2CTS27REDRGOT26DT2AKNCWHEMLXFPV/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02389-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021882.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02398-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZIQSMDCERQHP4JSQ3YSIO5TMBD637EV/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02393-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/536XR3DQAUU4EJXWQKQRE6QHNW7W4M5C/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02411-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEKG43SVEEUNQXJBCRXWGSWJ6NQ36NUC/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02392-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021879.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02394-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021878.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02396-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021876.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02391-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021880.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02433-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021883.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02420-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021886.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02428-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021889.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02418-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021888.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02451-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22P3K2RHZ424E6JGDSKSXUABXRESY6GY/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02416-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021890.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02415-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021891.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02446-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYAKCPI3CQKIWHWVXLDBJMK5CDOB5VRS/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02436-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOC4XFCSYMATM6FYIQWRDFK5AQF4P2LT/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02434-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM6XIBRQQ4DT55UN4XNTKFRWGXRY73A5/"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-11411 vom 2025-07-22",
        "url": "https://linux.oracle.com/errata/ELSA-2025-11411.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02454-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NNLH3GVII5RPJKDTSNRRAF2IHEZBWAO/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02444-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAPR5ITSSKHG4EAWNWSLSEMDSVTCH3CA/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02438-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C4GMDP2SNO4HPRFRHQVRBAS7WAZ5PYIZ/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02449-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOIECZ42HAJGKZ7TVGI4LLLNAG27ZF7L/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02442-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7BWN4GTGQU33LC3C2LNMXQT72KBQAYTF/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02422-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021884.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02421-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021885.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02419-1 vom 2025-07-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021887.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02445-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYJ3O67PBJST6GKMJJXDEBLGGDV5KJKJ/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02437-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCEZBA2U7C5F2MCQC3AIBIKAHNQBPFOI/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02455-1 vom 2025-07-21",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2GXZ2EL5OVKMNFWDPFV7NT367YYOFZO/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7651-3 vom 2025-07-22",
        "url": "https://ubuntu.com/security/notices/USN-7651-3"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02459-1 vom 2025-07-22",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNBGONL5CBCKJ2ZQN6XVJFDFNJMHMLDW/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
        "url": "https://ubuntu.com/security/notices/USN-7654-4"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-11428 vom 2025-07-23",
        "url": "https://linux.oracle.com/errata/ELSA-2025-11428.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7651-4 vom 2025-07-22",
        "url": "https://ubuntu.com/security/notices/USN-7651-4"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02468-1 vom 2025-07-22",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7LXLV4ZFW2U2LQ7EL4MR5BCEPMCAILY/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7651-5 vom 2025-07-24",
        "url": "https://ubuntu.com/security/notices/USN-7651-5"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02507-1 vom 2025-07-24",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021949.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7651-6 vom 2025-07-24",
        "url": "https://ubuntu.com/security/notices/USN-7651-6"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11861 vom 2025-07-28",
        "url": "https://access.redhat.com/errata/RHSA-2025:11861"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
        "url": "https://ubuntu.com/security/notices/USN-7654-5"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-11861 vom 2025-07-30",
        "url": "https://linux.oracle.com/errata/ELSA-2025-11861.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12209 vom 2025-07-29",
        "url": "https://access.redhat.com/errata/RHSA-2025:12209"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12311 vom 2025-07-30",
        "url": "https://access.redhat.com/errata/RHSA-2025:12311"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12525 vom 2025-08-04",
        "url": "https://access.redhat.com/errata/RHSA-2025:12525"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20526-1 vom 2025-08-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022026.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20527-1 vom 2025-08-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022025.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20518-1 vom 2025-08-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022033.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20520-1 vom 2025-08-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022031.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20528-1 vom 2025-08-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022024.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20525-1 vom 2025-08-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022027.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12662 vom 2025-08-04",
        "url": "https://access.redhat.com/errata/RHSA-2025:12662"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20517-1 vom 2025-08-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022034.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20519-1 vom 2025-08-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022032.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12746 vom 2025-08-04",
        "url": "https://access.redhat.com/errata/RHSA-2025:12746"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-098 vom 2025-08-05",
        "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-098.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12526 vom 2025-08-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:12526"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13061 vom 2025-08-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:13061"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13135 vom 2025-08-06",
        "url": "https://access.redhat.com/errata/RHSA-2025:13135"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20545-1 vom 2025-08-05",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022099.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20541-1 vom 2025-08-05",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022103.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20540-1 vom 2025-08-05",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022104.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13120 vom 2025-08-06",
        "url": "https://access.redhat.com/errata/RHSA-2025:13120"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20542-1 vom 2025-08-05",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022102.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20546-1 vom 2025-08-05",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022098.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13029 vom 2025-08-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:13029"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
        "url": "https://ubuntu.com/security/notices/USN-7686-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20544-1 vom 2025-08-05",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022100.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13030 vom 2025-08-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:13030"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-12746 vom 2025-08-06",
        "url": "https://linux.oracle.com/errata/ELSA-2025-12746.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7241589 vom 2025-08-06",
        "url": "https://www.ibm.com/support/pages/node/7241589"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13590 vom 2025-08-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:13590"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13589 vom 2025-08-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:13589"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-20520 vom 2025-08-11",
        "url": "https://linux.oracle.com/errata/ELSA-2025-20520.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-12662 vom 2025-08-11",
        "url": "https://linux.oracle.com/errata/ELSA-2025-12662.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13633 vom 2025-08-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:13633"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-13589 vom 2025-08-12",
        "url": "https://linux.oracle.com/errata/ELSA-2025-13589.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13776 vom 2025-08-13",
        "url": "https://access.redhat.com/errata/RHSA-2025:13776"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13781 vom 2025-08-13",
        "url": "https://access.redhat.com/errata/RHSA-2025:13781"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:14054 vom 2025-08-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:14054"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:14094 vom 2025-08-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:14094"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7703-1 vom 2025-08-20",
        "url": "https://ubuntu.com/security/notices/USN-7703-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:14136 vom 2025-08-20",
        "url": "https://access.redhat.com/errata/RHSA-2025:14136"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7703-2 vom 2025-08-20",
        "url": "https://ubuntu.com/security/notices/USN-7703-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7703-3 vom 2025-08-21",
        "url": "https://ubuntu.com/security/notices/USN-7703-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22",
        "url": "https://ubuntu.com/security/notices/USN-7712-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22",
        "url": "https://ubuntu.com/security/notices/USN-7711-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7719-1 vom 2025-08-26",
        "url": "https://ubuntu.com/security/notices/USN-7719-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:14748 vom 2025-08-27",
        "url": "https://access.redhat.com/errata/RHSA-2025:14748"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:14746 vom 2025-08-27",
        "url": "https://access.redhat.com/errata/RHSA-2025:14746"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7703-4 vom 2025-08-28",
        "url": "https://ubuntu.com/security/notices/USN-7703-4"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29",
        "url": "https://ubuntu.com/security/notices/USN-7727-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29",
        "url": "https://ubuntu.com/security/notices/USN-7727-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7726-3 vom 2025-08-29",
        "url": "https://ubuntu.com/security/notices/USN-7726-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7726-2 vom 2025-08-29",
        "url": "https://ubuntu.com/security/notices/USN-7726-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7726-1 vom 2025-08-29",
        "url": "https://ubuntu.com/security/notices/USN-7726-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7725-1 vom 2025-08-29",
        "url": "https://ubuntu.com/security/notices/USN-7725-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7725-2 vom 2025-08-29",
        "url": "https://ubuntu.com/security/notices/USN-7725-2"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:14985 vom 2025-09-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:14985"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:15035 vom 2025-09-02",
        "url": "https://access.redhat.com/errata/RHSA-2025:15035"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02",
        "url": "https://ubuntu.com/security/notices/USN-7712-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7725-3 vom 2025-09-02",
        "url": "https://ubuntu.com/security/notices/USN-7725-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7726-4 vom 2025-09-02",
        "url": "https://ubuntu.com/security/notices/USN-7726-4"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02",
        "url": "https://ubuntu.com/security/notices/USN-7727-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03",
        "url": "https://ubuntu.com/security/notices/USN-7737-1"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
        "url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:13590 vom 2025-09-08",
        "url": "https://errata.build.resf.org/RLSA-2025:13590"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
        "url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:15656 vom 2025-09-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:15656"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:15660 vom 2025-09-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:15660"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7754-2 vom 2025-09-17",
        "url": "https://ubuntu.com/security/notices/USN-7754-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7754-1 vom 2025-09-17",
        "url": "https://ubuntu.com/security/notices/USN-7754-1"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-109 vom 2025-09-16",
        "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-109.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7755-2 vom 2025-09-17",
        "url": "https://ubuntu.com/security/notices/USN-7755-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7755-1 vom 2025-09-17",
        "url": "https://ubuntu.com/security/notices/USN-7755-1"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-14987 vom 2025-09-18",
        "url": "https://linux.oracle.com/errata/ELSA-2025-14987.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-14748 vom 2025-09-18",
        "url": "https://linux.oracle.com/errata/ELSA-2025-14748.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7726-5 vom 2025-09-18",
        "url": "https://ubuntu.com/security/notices/USN-7726-5"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
        "url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7755-3 vom 2025-09-24",
        "url": "https://ubuntu.com/security/notices/USN-7755-3"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03315-1 vom 2025-09-24",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022621.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03317-1 vom 2025-09-24",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022619.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03343-1 vom 2025-09-24",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022628.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03341-1 vom 2025-09-24",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022629.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7776-1 vom 2025-09-25",
        "url": "https://ubuntu.com/security/notices/USN-7776-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7779-1 vom 2025-09-25",
        "url": "https://ubuntu.com/security/notices/USN-7779-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20727-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022691.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20737-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022718.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20787-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022660.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03370-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022642.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20785-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022655.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03374-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022694.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20769-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022673.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03375-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022693.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20738-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022697.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03381-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022722.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20726-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022692.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20728-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022690.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20768-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022674.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20722-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022683.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20784-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022713.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20770-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022672.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20723-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022689.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20725-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022681.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20786-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022654.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20724-1 vom 2025-09-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022682.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03397-1 vom 2025-09-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022736.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03391-1 vom 2025-09-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022743.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03408-1 vom 2025-09-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022734.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03395-1 vom 2025-09-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022739.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03400-1 vom 2025-09-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022737.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03393-1 vom 2025-09-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022740.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03387-1 vom 2025-09-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022742.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03406-1 vom 2025-09-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022732.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:17124 vom 2025-10-01",
        "url": "https://access.redhat.com/errata/RHSA-2025:17124"
      },
      {
        "category": "external",
        "summary": "Dell Security Update vom 2025-10-02",
        "url": "https://www.dell.com/support/kbdoc/000376224"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7795-1 vom 2025-10-02",
        "url": "https://ubuntu.com/security/notices/USN-7795-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7797-1 vom 2025-10-02",
        "url": "https://ubuntu.com/security/notices/USN-7797-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7796-1 vom 2025-10-02",
        "url": "https://ubuntu.com/security/notices/USN-7796-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7795-2 vom 2025-10-02",
        "url": "https://ubuntu.com/security/notices/USN-7796-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7802-1 vom 2025-10-02",
        "url": "https://ubuntu.com/security/notices/USN-7802-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7797-2 vom 2025-10-02",
        "url": "https://ubuntu.com/security/notices/USN-7797-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7796-3 vom 2025-10-02",
        "url": "https://ubuntu.com/security/notices/USN-7796-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7795-2 vom 2025-10-02",
        "url": "https://ubuntu.com/security/notices/USN-7795-2"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03468-1 vom 2025-10-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022783.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03472-1 vom 2025-10-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022780.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03476-1 vom 2025-10-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022777.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03475-1 vom 2025-10-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022778.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03469-1 vom 2025-10-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022782.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03465-1 vom 2025-10-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022774.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7809-1 vom 2025-10-08",
        "url": "https://ubuntu.com/security/notices/USN-7809-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03482-1 vom 2025-10-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022788.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7795-3 vom 2025-10-08",
        "url": "https://ubuntu.com/security/notices/USN-7795-3"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03496-1 vom 2025-10-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022795.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03494-1 vom 2025-10-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022794.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03504-1 vom 2025-10-09",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SECAEAK6WEIFWFKCJTBA2HF5JSEVDUS4/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03503-1 vom 2025-10-09",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JUWAQTIC7XPSFOY6GTF6ZLAS2JNMHEKU/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03514-1 vom 2025-10-09",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XAWB2PO5O6CBDV27R7BVVXL54MXG5ST5/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03529-1 vom 2025-10-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022817.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03528-1 vom 2025-10-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022818.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03539-1 vom 2025-10-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022824.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03538-1 vom 2025-10-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022825.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03571-1 vom 2025-10-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022839.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03541-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKOOHT7ZFB34FTK3MBV76ZBHNFB6V36H/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03554-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH3AMQOQLP3DYM2S52DBRVQOATOXEZ4A/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03555-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QIU2ENCHZ6TGXFRZ6RCIDKC37OKELKRV/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03566-1 vom 2025-10-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022843.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03569-1 vom 2025-10-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022840.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03577-1 vom 2025-10-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022835.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03563-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EC4PXMLKKMVMYAUI5S3O2XUOAVVXC2CO/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03559-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPHXJO5EMVRKXZC5ZXKEJXDYNB4RJTVU/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03543-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MC656OYGPRT7D2WOKGTVHYQVKRPDOF2M/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03580-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6S2ABU6DFOD2DPFHPKIDP3QVGRAYOKO/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03578-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JE73VH4T37L5F3VWVHXRSVC6UFH7VY2G/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03548-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SOZC4LP2VEWOVXCP5X7JSFTFZEWXQE6H/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03553-1 vom 2025-10-13",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVXXSG7PIJG7HTJMMXDXUMVAAMRTWXFG/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03557-1 vom 2025-10-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022848.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
        "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7796-4 vom 2025-10-13",
        "url": "https://ubuntu.com/security/notices/USN-7796-4"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7820-1 vom 2025-10-13",
        "url": "https://ubuntu.com/security/notices/USN-7820-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7819-1 vom 2025-10-13",
        "url": "https://ubuntu.com/security/notices/USN-7819-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20806-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022878.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20807-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022877.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20808-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022876.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20813-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022871.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20814-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022870.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20819-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022865.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20827-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022898.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20840-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022885.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20841-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022884.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20826-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022899.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20833-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022892.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20835-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022890.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20832-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022893.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20834-1 vom 2025-10-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022891.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-17161 vom 2025-10-21",
        "url": "https://linux.oracle.com/errata/ELSA-2025-17161.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7832-1 vom 2025-10-21",
        "url": "https://ubuntu.com/security/notices/USN-7832-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7819-2 vom 2025-10-22",
        "url": "https://ubuntu.com/security/notices/USN-7819-2"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7249042 vom 2025-10-23",
        "url": "https://www.ibm.com/support/pages/node/7249042"
      }
    ],
    "source_lang": "en-US",
    "title": "Linux Kernel: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-10-23T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-24T08:34:26.401+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2025-0453",
      "initial_release_date": "2025-02-26T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2025-02-26T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-03-09T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-03-10T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-03-11T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-03-12T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-03-13T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-03-19T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2025-03-23T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-03-24T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-03-25T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-03-26T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2025-03-31T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2025-04-01T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-04-08T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-04-09T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-04-10T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-04-13T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2025-04-14T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-04-15T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-04-16T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-04-21T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-04-22T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-04-23T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-04-24T22:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-04-27T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-04-28T22:00:00.000+00:00",
          "number": "26",
          "summary": "PoC f\u00fcr CVE-2025-21756 aufgenommen"
        },
        {
          "date": "2025-04-29T22:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-05-01T22:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-05-13T22:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-05-14T22:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-05-15T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-05-18T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von SUSE, Ubuntu und Red Hat aufgenommen"
        },
        {
          "date": "2025-05-19T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-05-20T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Ubuntu, SUSE und Red Hat aufgenommen"
        },
        {
          "date": "2025-05-21T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von SUSE, Ubuntu und Oracle Linux aufgenommen"
        },
        {
          "date": "2025-05-22T22:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
        },
        {
          "date": "2025-05-25T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-05-26T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Ubuntu, Debian und SUSE aufgenommen"
        },
        {
          "date": "2025-05-27T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
        },
        {
          "date": "2025-05-29T22:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von Ubuntu, Debian, SUSE und Amazon aufgenommen"
        },
        {
          "date": "2025-06-01T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-06-02T22:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-03T22:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-06-09T22:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von SUSE und Amazon aufgenommen"
        },
        {
          "date": "2025-06-10T22:00:00.000+00:00",
          "number": "45",
          "summary": "Neue Updates von SUSE und Siemens aufgenommen"
        },
        {
          "date": "2025-06-11T22:00:00.000+00:00",
          "number": "46",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-12T22:00:00.000+00:00",
          "number": "47",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-15T22:00:00.000+00:00",
          "number": "48",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-16T22:00:00.000+00:00",
          "number": "49",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-17T22:00:00.000+00:00",
          "number": "50",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-19T22:00:00.000+00:00",
          "number": "51",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-23T22:00:00.000+00:00",
          "number": "52",
          "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
        },
        {
          "date": "2025-06-24T22:00:00.000+00:00",
          "number": "53",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-06-25T22:00:00.000+00:00",
          "number": "54",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2025-06-26T22:00:00.000+00:00",
          "number": "55",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-01T22:00:00.000+00:00",
          "number": "56",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2025-07-03T22:00:00.000+00:00",
          "number": "57",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-07-06T22:00:00.000+00:00",
          "number": "58",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-07T22:00:00.000+00:00",
          "number": "59",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-07-08T22:00:00.000+00:00",
          "number": "60",
          "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
        },
        {
          "date": "2025-07-10T22:00:00.000+00:00",
          "number": "61",
          "summary": "Neue Updates von SUSE und Amazon aufgenommen"
        },
        {
          "date": "2025-07-13T22:00:00.000+00:00",
          "number": "62",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-14T22:00:00.000+00:00",
          "number": "63",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-15T22:00:00.000+00:00",
          "number": "64",
          "summary": "Neue Updates von SUSE und Red Hat aufgenommen"
        },
        {
          "date": "2025-07-16T22:00:00.000+00:00",
          "number": "65",
          "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
        },
        {
          "date": "2025-07-17T22:00:00.000+00:00",
          "number": "66",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-20T22:00:00.000+00:00",
          "number": "67",
          "summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2025-07-21T22:00:00.000+00:00",
          "number": "68",
          "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
        },
        {
          "date": "2025-07-22T22:00:00.000+00:00",
          "number": "69",
          "summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen"
        },
        {
          "date": "2025-07-23T22:00:00.000+00:00",
          "number": "70",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-24T22:00:00.000+00:00",
          "number": "71",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-27T22:00:00.000+00:00",
          "number": "72",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-28T22:00:00.000+00:00",
          "number": "73",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-29T22:00:00.000+00:00",
          "number": "74",
          "summary": "Neue Updates von Ubuntu, Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2025-07-30T22:00:00.000+00:00",
          "number": "75",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-31T22:00:00.000+00:00",
          "number": "76",
          "summary": "Referenz(en) aufgenommen:"
        },
        {
          "date": "2025-08-03T22:00:00.000+00:00",
          "number": "77",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "78",
          "summary": "Neue Updates von Red Hat und Amazon aufgenommen"
        },
        {
          "date": "2025-08-05T22:00:00.000+00:00",
          "number": "79",
          "summary": "Neue Updates von Red Hat, SUSE und Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-06T22:00:00.000+00:00",
          "number": "80",
          "summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
        },
        {
          "date": "2025-08-10T22:00:00.000+00:00",
          "number": "81",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-08-11T22:00:00.000+00:00",
          "number": "82",
          "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2025-08-12T22:00:00.000+00:00",
          "number": "83",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-08-18T22:00:00.000+00:00",
          "number": "84",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2025-08-19T22:00:00.000+00:00",
          "number": "85",
          "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-20T22:00:00.000+00:00",
          "number": "86",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-21T22:00:00.000+00:00",
          "number": "87",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-24T22:00:00.000+00:00",
          "number": "88",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-26T22:00:00.000+00:00",
          "number": "89",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-27T22:00:00.000+00:00",
          "number": "90",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-08-28T22:00:00.000+00:00",
          "number": "91",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-09-01T22:00:00.000+00:00",
          "number": "92",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-09-02T22:00:00.000+00:00",
          "number": "93",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-09-03T22:00:00.000+00:00",
          "number": "94",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-09-08T22:00:00.000+00:00",
          "number": "95",
          "summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2025-09-09T22:00:00.000+00:00",
          "number": "96",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-09-10T22:00:00.000+00:00",
          "number": "97",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-09-16T22:00:00.000+00:00",
          "number": "98",
          "summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
        },
        {
          "date": "2025-09-17T22:00:00.000+00:00",
          "number": "99",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-09-18T22:00:00.000+00:00",
          "number": "100",
          "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
        },
        {
          "date": "2025-09-22T22:00:00.000+00:00",
          "number": "101",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2025-09-23T22:00:00.000+00:00",
          "number": "102",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-09-24T22:00:00.000+00:00",
          "number": "103",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-09-25T22:00:00.000+00:00",
          "number": "104",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-09-28T22:00:00.000+00:00",
          "number": "105",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-09-30T22:00:00.000+00:00",
          "number": "106",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-01T22:00:00.000+00:00",
          "number": "107",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2025-10-05T22:00:00.000+00:00",
          "number": "108",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-10-07T22:00:00.000+00:00",
          "number": "109",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-10-08T22:00:00.000+00:00",
          "number": "110",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-10-09T22:00:00.000+00:00",
          "number": "111",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-10-12T22:00:00.000+00:00",
          "number": "112",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-10-13T22:00:00.000+00:00",
          "number": "113",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-10-14T22:00:00.000+00:00",
          "number": "114",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-10-20T22:00:00.000+00:00",
          "number": "115",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-10-21T22:00:00.000+00:00",
          "number": "116",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-10-23T22:00:00.000+00:00",
          "number": "117",
          "summary": "Neue Updates von IBM aufgenommen"
        }
      ],
      "status": "final",
      "version": "117"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Dell Avamar",
            "product": {
              "name": "Dell Avamar",
              "product_id": "T039664",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:avamar:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Dell NetWorker",
            "product": {
              "name": "Dell NetWorker",
              "product_id": "T034583",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:networker:virtual"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
                  "product_id": "T045879"
                }
              },
              {
                "category": "product_version",
                "name": "8.4.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.4.0.0",
                  "product_id": "T045879-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
                  "product_id": "T045881"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.70",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.70",
                  "product_id": "T045881-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
                  "product_id": "T047343"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.40",
                  "product_id": "T047343-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
                  "product_id": "T047344"
                }
              },
              {
                "category": "product_version",
                "name": "8.3.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.3.1.10",
                  "product_id": "T047344-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Google Container-Optimized OS",
            "product": {
              "name": "Google Container-Optimized OS",
              "product_id": "1607324",
              "product_identification_helper": {
                "cpe": "cpe:/o:google:container-optimized_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Google"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c10.5.0.19",
                "product": {
                  "name": "IBM DataPower Gateway \u003c10.5.0.19",
                  "product_id": "T047864"
                }
              },
              {
                "category": "product_version",
                "name": "10.5.0.19",
                "product": {
                  "name": "IBM DataPower Gateway 10.5.0.19",
                  "product_id": "T047864-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:datapower_gateway:10.5.0.19"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c10.6.0.7",
                "product": {
                  "name": "IBM DataPower Gateway \u003c10.6.0.7",
                  "product_id": "T047866"
                }
              },
              {
                "category": "product_version",
                "name": "10.6.0.7",
                "product": {
                  "name": "IBM DataPower Gateway 10.6.0.7",
                  "product_id": "T047866-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:datapower_gateway:10.6.0.7"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "DataPower Gateway"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP11 IF04",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04",
                  "product_id": "T043169"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP11 IF04",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP11 IF04",
                  "product_id": "T043169-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP13",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP13",
                  "product_id": "T045828"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP13",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP13",
                  "product_id": "T045828-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up13"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source Linux Kernel",
            "product": {
              "name": "Open Source Linux Kernel",
              "product_id": "T046484",
              "product_identification_helper": {
                "cpe": "cpe:/o:linux:linux_kernel:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.14.49",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.14.49",
                  "product_id": "T042010"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.14.49",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.14.49",
                  "product_id": "T042010-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.49"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "1500 CPU",
                "product": {
                  "name": "Siemens SIMATIC S7 1500 CPU",
                  "product_id": "T025776",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:siemens:simatic_s7:1500_cpu"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c2025.2.1",
                "product": {
                  "name": "SolarWinds Security Event Manager \u003c2025.2.1",
                  "product_id": "T044986"
                }
              },
              {
                "category": "product_version",
                "name": "2025.2.1",
                "product": {
                  "name": "SolarWinds Security Event Manager 2025.2.1",
                  "product_id": "T044986-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Security Event Manager"
          }
        ],
        "category": "vendor",
        "name": "SolarWinds"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-49732",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2022-49732"
    },
    {
      "cve": "CVE-2024-49570",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-49570"
    },
    {
      "cve": "CVE-2024-52557",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-52557"
    },
    {
      "cve": "CVE-2024-52559",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-52559"
    },
    {
      "cve": "CVE-2024-52560",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-52560"
    },
    {
      "cve": "CVE-2024-54456",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-54456"
    },
    {
      "cve": "CVE-2024-54458",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-54458"
    },
    {
      "cve": "CVE-2024-57834",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57834"
    },
    {
      "cve": "CVE-2024-57852",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57852"
    },
    {
      "cve": "CVE-2024-57953",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57953"
    },
    {
      "cve": "CVE-2024-57973",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57973"
    },
    {
      "cve": "CVE-2024-57974",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57974"
    },
    {
      "cve": "CVE-2024-57975",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57975"
    },
    {
      "cve": "CVE-2024-57976",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57976"
    },
    {
      "cve": "CVE-2024-57977",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57977"
    },
    {
      "cve": "CVE-2024-57978",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57978"
    },
    {
      "cve": "CVE-2024-57979",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57979"
    },
    {
      "cve": "CVE-2024-57980",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57980"
    },
    {
      "cve": "CVE-2024-57981",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57981"
    },
    {
      "cve": "CVE-2024-57982",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57982"
    },
    {
      "cve": "CVE-2024-57983",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57983"
    },
    {
      "cve": "CVE-2024-57984",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57984"
    },
    {
      "cve": "CVE-2024-57985",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57985"
    },
    {
      "cve": "CVE-2024-57986",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57986"
    },
    {
      "cve": "CVE-2024-57987",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57987"
    },
    {
      "cve": "CVE-2024-57988",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57988"
    },
    {
      "cve": "CVE-2024-57989",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57989"
    },
    {
      "cve": "CVE-2024-57990",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57990"
    },
    {
      "cve": "CVE-2024-57991",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57991"
    },
    {
      "cve": "CVE-2024-57992",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57992"
    },
    {
      "cve": "CVE-2024-57993",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57993"
    },
    {
      "cve": "CVE-2024-57994",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57994"
    },
    {
      "cve": "CVE-2024-57995",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57995"
    },
    {
      "cve": "CVE-2024-57996",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57996"
    },
    {
      "cve": "CVE-2024-57997",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57997"
    },
    {
      "cve": "CVE-2024-57998",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57998"
    },
    {
      "cve": "CVE-2024-57999",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-57999"
    },
    {
      "cve": "CVE-2024-58000",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58000"
    },
    {
      "cve": "CVE-2024-58001",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58001"
    },
    {
      "cve": "CVE-2024-58002",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58002"
    },
    {
      "cve": "CVE-2024-58003",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58003"
    },
    {
      "cve": "CVE-2024-58004",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58004"
    },
    {
      "cve": "CVE-2024-58005",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58005"
    },
    {
      "cve": "CVE-2024-58006",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58006"
    },
    {
      "cve": "CVE-2024-58007",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58007"
    },
    {
      "cve": "CVE-2024-58008",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58008"
    },
    {
      "cve": "CVE-2024-58009",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58009"
    },
    {
      "cve": "CVE-2024-58010",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58010"
    },
    {
      "cve": "CVE-2024-58011",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58011"
    },
    {
      "cve": "CVE-2024-58012",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58012"
    },
    {
      "cve": "CVE-2024-58013",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58013"
    },
    {
      "cve": "CVE-2024-58014",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58014"
    },
    {
      "cve": "CVE-2024-58015",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58015"
    },
    {
      "cve": "CVE-2024-58016",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58016"
    },
    {
      "cve": "CVE-2024-58017",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58017"
    },
    {
      "cve": "CVE-2024-58018",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58018"
    },
    {
      "cve": "CVE-2024-58019",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58019"
    },
    {
      "cve": "CVE-2024-58020",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58020"
    },
    {
      "cve": "CVE-2024-58021",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-58021"
    },
    {
      "cve": "CVE-2025-21705",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21705"
    },
    {
      "cve": "CVE-2025-21706",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21706"
    },
    {
      "cve": "CVE-2025-21707",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21707"
    },
    {
      "cve": "CVE-2025-21708",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21708"
    },
    {
      "cve": "CVE-2025-21709",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21709"
    },
    {
      "cve": "CVE-2025-21710",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21710"
    },
    {
      "cve": "CVE-2025-21711",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21711"
    },
    {
      "cve": "CVE-2025-21712",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21712"
    },
    {
      "cve": "CVE-2025-21713",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21713"
    },
    {
      "cve": "CVE-2025-21714",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21714"
    },
    {
      "cve": "CVE-2025-21715",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21715"
    },
    {
      "cve": "CVE-2025-21716",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21716"
    },
    {
      "cve": "CVE-2025-21717",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21717"
    },
    {
      "cve": "CVE-2025-21718",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21718"
    },
    {
      "cve": "CVE-2025-21719",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21719"
    },
    {
      "cve": "CVE-2025-21720",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21720"
    },
    {
      "cve": "CVE-2025-21721",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21721"
    },
    {
      "cve": "CVE-2025-21722",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21722"
    },
    {
      "cve": "CVE-2025-21723",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21723"
    },
    {
      "cve": "CVE-2025-21724",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21724"
    },
    {
      "cve": "CVE-2025-21725",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21725"
    },
    {
      "cve": "CVE-2025-21726",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21726"
    },
    {
      "cve": "CVE-2025-21727",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21727"
    },
    {
      "cve": "CVE-2025-21728",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21728"
    },
    {
      "cve": "CVE-2025-21729",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21729"
    },
    {
      "cve": "CVE-2025-21730",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21730"
    },
    {
      "cve": "CVE-2025-21731",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21731"
    },
    {
      "cve": "CVE-2025-21732",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21732"
    },
    {
      "cve": "CVE-2025-21733",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21733"
    },
    {
      "cve": "CVE-2025-21734",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21734"
    },
    {
      "cve": "CVE-2025-21735",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21735"
    },
    {
      "cve": "CVE-2025-21736",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21736"
    },
    {
      "cve": "CVE-2025-21737",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21737"
    },
    {
      "cve": "CVE-2025-21738",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21738"
    },
    {
      "cve": "CVE-2025-21739",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21739"
    },
    {
      "cve": "CVE-2025-21740",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21740"
    },
    {
      "cve": "CVE-2025-21741",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21741"
    },
    {
      "cve": "CVE-2025-21742",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21742"
    },
    {
      "cve": "CVE-2025-21743",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21743"
    },
    {
      "cve": "CVE-2025-21744",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21744"
    },
    {
      "cve": "CVE-2025-21745",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21745"
    },
    {
      "cve": "CVE-2025-21746",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21746"
    },
    {
      "cve": "CVE-2025-21747",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21747"
    },
    {
      "cve": "CVE-2025-21748",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21748"
    },
    {
      "cve": "CVE-2025-21749",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21749"
    },
    {
      "cve": "CVE-2025-21750",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21750"
    },
    {
      "cve": "CVE-2025-21751",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21751"
    },
    {
      "cve": "CVE-2025-21752",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21752"
    },
    {
      "cve": "CVE-2025-21753",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21753"
    },
    {
      "cve": "CVE-2025-21754",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21754"
    },
    {
      "cve": "CVE-2025-21755",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21755"
    },
    {
      "cve": "CVE-2025-21756",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21756"
    },
    {
      "cve": "CVE-2025-21757",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21757"
    },
    {
      "cve": "CVE-2025-21758",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21758"
    },
    {
      "cve": "CVE-2025-21759",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21759"
    },
    {
      "cve": "CVE-2025-21760",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21760"
    },
    {
      "cve": "CVE-2025-21761",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21761"
    },
    {
      "cve": "CVE-2025-21762",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21762"
    },
    {
      "cve": "CVE-2025-21763",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21763"
    },
    {
      "cve": "CVE-2025-21764",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21764"
    },
    {
      "cve": "CVE-2025-21765",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21765"
    },
    {
      "cve": "CVE-2025-21766",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21766"
    },
    {
      "cve": "CVE-2025-21767",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21767"
    },
    {
      "cve": "CVE-2025-21768",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21768"
    },
    {
      "cve": "CVE-2025-21769",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21769"
    },
    {
      "cve": "CVE-2025-21770",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21770"
    },
    {
      "cve": "CVE-2025-21771",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21771"
    },
    {
      "cve": "CVE-2025-21772",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21772"
    },
    {
      "cve": "CVE-2025-21773",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21773"
    },
    {
      "cve": "CVE-2025-21774",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21774"
    },
    {
      "cve": "CVE-2025-21775",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21775"
    },
    {
      "cve": "CVE-2025-21776",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21776"
    },
    {
      "cve": "CVE-2025-21777",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21777"
    },
    {
      "cve": "CVE-2025-21778",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21778"
    },
    {
      "cve": "CVE-2025-21779",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21779"
    },
    {
      "cve": "CVE-2025-21780",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21780"
    },
    {
      "cve": "CVE-2025-21781",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21781"
    },
    {
      "cve": "CVE-2025-21782",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21782"
    },
    {
      "cve": "CVE-2025-21783",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21783"
    },
    {
      "cve": "CVE-2025-21784",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21784"
    },
    {
      "cve": "CVE-2025-21785",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21785"
    },
    {
      "cve": "CVE-2025-21786",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21786"
    },
    {
      "cve": "CVE-2025-21787",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21787"
    },
    {
      "cve": "CVE-2025-21788",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21788"
    },
    {
      "cve": "CVE-2025-21789",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21789"
    },
    {
      "cve": "CVE-2025-21790",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21790"
    },
    {
      "cve": "CVE-2025-21791",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21791"
    },
    {
      "cve": "CVE-2025-21792",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21792"
    },
    {
      "cve": "CVE-2025-21793",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21793"
    },
    {
      "cve": "CVE-2025-21794",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21794"
    },
    {
      "cve": "CVE-2025-21795",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21795"
    },
    {
      "cve": "CVE-2025-21796",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21796"
    },
    {
      "cve": "CVE-2025-21797",
      "product_status": {
        "known_affected": [
          "67646",
          "T034583",
          "T045828",
          "T004914",
          "T032255",
          "T039664",
          "T043169",
          "T044986",
          "T047866",
          "2951",
          "T002207",
          "T045879",
          "T000126",
          "T046484",
          "T047343",
          "398363",
          "T025776",
          "1607324",
          "T042010",
          "T045881",
          "T047864",
          "T047344"
        ]
      },
      "release_date": "2025-02-26T23:00:00.000+00:00",
      "title": "CVE-2025-21797"
    }
  ]
}
  ncsc-2025-0187
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als RUGGEDCOM, SCALANCE, SIMATIC en Tecnomatix",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Spoofing\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Use of NullPointerException Catch to Detect NULL Pointer Dereference",
        "title": "CWE-395"
      },
      {
        "category": "general",
        "text": "Insufficient Entropy in PRNG",
        "title": "CWE-332"
      },
      {
        "category": "general",
        "text": "Improper Verification of Source of a Communication Channel",
        "title": "CWE-940"
      },
      {
        "category": "general",
        "text": "Return of Pointer Value Outside of Expected Range",
        "title": "CWE-466"
      },
      {
        "category": "general",
        "text": "Detection of Error Condition Without Action",
        "title": "CWE-390"
      },
      {
        "category": "general",
        "text": "Premature Release of Resource During Expected Lifetime",
        "title": "CWE-826"
      },
      {
        "category": "general",
        "text": "Truncation of Security-relevant Information",
        "title": "CWE-222"
      },
      {
        "category": "general",
        "text": "CWE-310",
        "title": "CWE-310"
      },
      {
        "category": "general",
        "text": "Improper Check for Dropped Privileges",
        "title": "CWE-273"
      },
      {
        "category": "general",
        "text": "Signal Handler Race Condition",
        "title": "CWE-364"
      },
      {
        "category": "general",
        "text": "Improper Update of Reference Count",
        "title": "CWE-911"
      },
      {
        "category": "general",
        "text": "Incorrect Calculation of Buffer Size",
        "title": "CWE-131"
      },
      {
        "category": "general",
        "text": "Missing Critical Step in Authentication",
        "title": "CWE-304"
      },
      {
        "category": "general",
        "text": "Incorrect Provision of Specified Functionality",
        "title": "CWE-684"
      },
      {
        "category": "general",
        "text": "Improper Handling of Length Parameter Inconsistency",
        "title": "CWE-130"
      },
      {
        "category": "general",
        "text": "Privilege Chaining",
        "title": "CWE-268"
      },
      {
        "category": "general",
        "text": "Race Condition within a Thread",
        "title": "CWE-366"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Escape, Meta, or Control Sequences",
        "title": "CWE-150"
      },
      {
        "category": "general",
        "text": "Insertion of Sensitive Information Into Sent Data",
        "title": "CWE-201"
      },
      {
        "category": "general",
        "text": "Inefficient Algorithmic Complexity",
        "title": "CWE-407"
      },
      {
        "category": "general",
        "text": "CWE-371",
        "title": "CWE-371"
      },
      {
        "category": "general",
        "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
        "title": "CWE-367"
      },
      {
        "category": "general",
        "text": "Improper Locking",
        "title": "CWE-667"
      },
      {
        "category": "general",
        "text": "Missing Encryption of Sensitive Data",
        "title": "CWE-311"
      },
      {
        "category": "general",
        "text": "Improper Check or Handling of Exceptional Conditions",
        "title": "CWE-703"
      },
      {
        "category": "general",
        "text": "Use of Uninitialized Resource",
        "title": "CWE-908"
      },
      {
        "category": "general",
        "text": "Reachable Assertion",
        "title": "CWE-617"
      },
      {
        "category": "general",
        "text": "Improper Validation of Array Index",
        "title": "CWE-129"
      },
      {
        "category": "general",
        "text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
        "title": "CWE-124"
      },
      {
        "category": "general",
        "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
        "title": "CWE-843"
      },
      {
        "category": "general",
        "text": "Insufficient Verification of Data Authenticity",
        "title": "CWE-345"
      },
      {
        "category": "general",
        "text": "Improper Validation of Integrity Check Value",
        "title": "CWE-354"
      },
      {
        "category": "general",
        "text": "Missing Cryptographic Step",
        "title": "CWE-325"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Authentication Bypass by Spoofing",
        "title": "CWE-290"
      },
      {
        "category": "general",
        "text": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)",
        "title": "CWE-99"
      },
      {
        "category": "general",
        "text": "Improper Initialization",
        "title": "CWE-665"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
        "title": "CWE-757"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Improper Restriction of XML External Entity Reference",
        "title": "CWE-611"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "External Control of File Name or Path",
        "title": "CWE-73"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Incorrect Authorization",
        "title": "CWE-863"
      },
      {
        "category": "general",
        "text": "Incorrect Default Permissions",
        "title": "CWE-276"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-082556.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-345750.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-486186.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-513708.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-633269.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-693776.pdf"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Siemens producten",
    "tracking": {
      "current_release_date": "2025-06-10T13:11:56.672768Z",
      "generator": {
        "date": "2025-06-05T14:45:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.1"
        }
      },
      "id": "NCSC-2025-0187",
      "initial_release_date": "2025-06-10T13:11:56.672768Z",
      "revision_history": [
        {
          "date": "2025-06-10T13:11:56.672768Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/none",
                    "product": {
                      "name": "vers:unknown/none",
                      "product_id": "CSAFPID-1211853"
                    }
                  }
                ],
                "category": "product_name",
                "name": "SIMATIC S7-1500"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:siemens/3.1.0",
                    "product": {
                      "name": "vers:siemens/3.1.0",
                      "product_id": "CSAFPID-1195553"
                    }
                  }
                ],
                "category": "product_name",
                "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP Firmware"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/1.0",
                    "product": {
                      "name": "vers:unknown/1.0",
                      "product_id": "CSAFPID-1211202"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Simatic S7-1500 Tm Mfp Firmware"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:siemens/7.4.3",
                    "product": {
                      "name": "vers:siemens/7.4.3",
                      "product_id": "CSAFPID-2849543"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/none",
                    "product": {
                      "name": "vers:unknown/none",
                      "product_id": "CSAFPID-1756091"
                    }
                  }
                ],
                "category": "product_name",
                "name": "RUGGEDCOM APE1808 Firmware"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/none",
                    "product": {
                      "name": "vers:unknown/none",
                      "product_id": "CSAFPID-2619544"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Ruggedcom Ape1808"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:siemens/3.0.0",
                    "product": {
                      "name": "vers:siemens/3.0.0",
                      "product_id": "CSAFPID-2082475"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Scalance W700 Ieee 802.11Ax Firmware"
              }
            ],
            "category": "product_family",
            "name": "Siemens"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266669"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266670"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266671"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266672"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "vers:all/*",
                  "product_id": "CSAFPID-2460438"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:unknown/\u003cv1.3.0",
                "product": {
                  "name": "vers:unknown/\u003cv1.3.0",
                  "product_id": "CSAFPID-1270701"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 TM MFP - BIOS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/\u003cv1.1",
                "product": {
                  "name": "vers:unknown/\u003cv1.1",
                  "product_id": "CSAFPID-1270700"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266673"
                }
              }
            ],
            "category": "product_name",
            "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "vers:all/*",
                  "product_id": "CSAFPID-1272525"
                }
              }
            ],
            "category": "product_name",
            "name": "RUGGEDCOM APE1808"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-126262",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "ruggedcom_ape1808"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "vers:all/*",
                  "product_id": "CSAFPID-2905706"
                }
              }
            ],
            "category": "product_name",
            "name": "Energy Services"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv2404.0013",
                "product": {
                  "name": "vers:all/\u003cv2404.0013",
                  "product_id": "CSAFPID-2905742"
                }
              }
            ],
            "category": "product_name",
            "name": "Tecnomatix Plant Simulation V2404"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905748"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905793"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905749"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905794"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905750"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905795"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905751"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905796"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905752"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905797"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905753"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905798"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905754"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905799"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905755"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905800"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905756"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905801"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905757"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905802"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905758"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905803"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905759"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905804"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905760"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905805"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905761"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905806"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905762"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905807"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905763"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905808"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905764"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905809"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905765"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905810"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905766"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905811"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905767"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905812"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905768"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905813"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905769"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905814"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905770"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905815"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905771"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905816"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905772"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905817"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905773"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905818"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905774"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905819"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905775"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905820"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905776"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905821"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905777"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905822"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905778"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905823"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905786"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905831"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905785"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905830"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905787"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905832"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905783"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905828"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905782"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905827"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905784"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905829"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905780"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905825"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905779"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905824"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905781"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905826"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-41617",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        },
        {
          "category": "other",
          "text": "Improper Check for Dropped Privileges",
          "title": "CWE-273"
        },
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-41617 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-41617.json"
        }
      ],
      "title": "CVE-2021-41617"
    },
    {
      "cve": "CVE-2023-4527",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4527 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4527.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-4527"
    },
    {
      "cve": "CVE-2023-4806",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4806 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4806.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-4806"
    },
    {
      "cve": "CVE-2023-4911",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4911 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4911.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-4911"
    },
    {
      "cve": "CVE-2023-5363",
      "cwe": {
        "id": "CWE-325",
        "name": "Missing Cryptographic Step"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Cryptographic Step",
          "title": "CWE-325"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Incorrect Provision of Specified Functionality",
          "title": "CWE-684"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5363 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-5363.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2023-6246",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6246 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6246.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-6246"
    },
    {
      "cve": "CVE-2023-6779",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6779 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6779.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-6779"
    },
    {
      "cve": "CVE-2023-6780",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "other",
          "text": "Incorrect Calculation of Buffer Size",
          "title": "CWE-131"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6780 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6780.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-6780"
    },
    {
      "cve": "CVE-2023-28531",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-28531 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-28531.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-28531"
    },
    {
      "cve": "CVE-2023-38545",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38545 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-38545.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "cwe": {
        "id": "CWE-73",
        "name": "External Control of File Name or Path"
      },
      "notes": [
        {
          "category": "other",
          "text": "External Control of File Name or Path",
          "title": "CWE-73"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38546 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-38546.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-44487 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-44487.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-46218",
      "cwe": {
        "id": "CWE-201",
        "name": "Insertion of Sensitive Information Into Sent Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insertion of Sensitive Information Into Sent Data",
          "title": "CWE-201"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46218 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46218.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46219 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46219.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Truncation of Security-relevant Information",
          "title": "CWE-222"
        },
        {
          "category": "other",
          "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
          "title": "CWE-757"
        },
        {
          "category": "other",
          "text": "Improper Validation of Integrity Check Value",
          "title": "CWE-354"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:L/U:Amber",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-48795 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-48795.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51384",
      "cwe": {
        "id": "CWE-304",
        "name": "Missing Critical Step in Authentication"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Critical Step in Authentication",
          "title": "CWE-304"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-51384 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-51384.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-51384"
    },
    {
      "cve": "CVE-2023-51385",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-51385 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-51385.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-51385"
    },
    {
      "cve": "CVE-2023-52927",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-52927 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-52927.json"
        }
      ],
      "title": "CVE-2023-52927"
    },
    {
      "cve": "CVE-2024-2961",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2961 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-2961.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-6119",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
          "title": "CWE-843"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6119 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6119.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-6119"
    },
    {
      "cve": "CVE-2024-6387",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Signal Handler Race Condition",
          "title": "CWE-364"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6387 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6387.json"
        }
      ],
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-12133",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Inefficient Algorithmic Complexity",
          "title": "CWE-407"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-12133 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
        }
      ],
      "title": "CVE-2024-12133"
    },
    {
      "cve": "CVE-2024-12243",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Inefficient Algorithmic Complexity",
          "title": "CWE-407"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-12243 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12243.json"
        }
      ],
      "title": "CVE-2024-12243"
    },
    {
      "cve": "CVE-2024-24855",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        },
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24855 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-24855.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-24855"
    },
    {
      "cve": "CVE-2024-26596",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26596 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-26596.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-26596"
    },
    {
      "cve": "CVE-2024-28085",
      "cwe": {
        "id": "CWE-268",
        "name": "Privilege Chaining"
      },
      "notes": [
        {
          "category": "other",
          "text": "Privilege Chaining",
          "title": "CWE-268"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Escape, Meta, or Control Sequences",
          "title": "CWE-150"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28085 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28085.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-33599",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33599 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33599.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33600 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33600.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "cwe": {
        "id": "CWE-703",
        "name": "Improper Check or Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        },
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33601 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33601.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "other",
          "text": "Return of Pointer Value Outside of Expected Range",
          "title": "CWE-466"
        },
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33602 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33602.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34397",
      "cwe": {
        "id": "CWE-940",
        "name": "Improper Verification of Source of a Communication Channel"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Verification of Source of a Communication Channel",
          "title": "CWE-940"
        },
        {
          "category": "other",
          "text": "Authentication Bypass by Spoofing",
          "title": "CWE-290"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-34397 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-34397.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-34397"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        },
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37370 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37370.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37371 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37371.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-41797",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-41797 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-41797.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-41797"
    },
    {
      "cve": "CVE-2024-45490",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "other",
          "text": "Incorrect Calculation of Buffer Size",
          "title": "CWE-131"
        },
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45490 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45490.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-45490"
    },
    {
      "cve": "CVE-2024-45491",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45491 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45491.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-45491"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45492 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45492.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-50246",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50246 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50246.json"
        }
      ],
      "title": "CVE-2024-50246"
    },
    {
      "cve": "CVE-2024-53166",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-53166 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-53166.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-53166"
    },
    {
      "cve": "CVE-2024-57977",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Locking",
          "title": "CWE-667"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-57977 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57977.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-57977"
    },
    {
      "cve": "CVE-2024-57996",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Array Index",
          "title": "CWE-129"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-57996 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57996.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-57996"
    },
    {
      "cve": "CVE-2024-58005",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)",
          "title": "CWE-99"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-58005 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-58005.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-58005"
    },
    {
      "cve": "CVE-2025-0133",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:M/U:Amber",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-0133 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0133.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-0133"
    },
    {
      "cve": "CVE-2025-4373",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
          "title": "CWE-124"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-4373 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4373.json"
        }
      ],
      "title": "CVE-2025-4373"
    },
    {
      "cve": "CVE-2025-4598",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Signal Handler Race Condition",
          "title": "CWE-364"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-4598 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4598.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-4598"
    },
    {
      "cve": "CVE-2025-21701",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21701 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21701.json"
        }
      ],
      "title": "CVE-2025-21701"
    },
    {
      "cve": "CVE-2025-21702",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21702 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21702.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21702"
    },
    {
      "cve": "CVE-2025-21712",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21712 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21712.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21712"
    },
    {
      "cve": "CVE-2025-21724",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21724 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21724.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21724"
    },
    {
      "cve": "CVE-2025-21728",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21728 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21728.json"
        }
      ],
      "title": "CVE-2025-21728"
    },
    {
      "cve": "CVE-2025-21745",
      "cwe": {
        "id": "CWE-911",
        "name": "Improper Update of Reference Count"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Update of Reference Count",
          "title": "CWE-911"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21745 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21745.json"
        }
      ],
      "title": "CVE-2025-21745"
    },
    {
      "cve": "CVE-2025-21756",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21756 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21756.json"
        }
      ],
      "title": "CVE-2025-21756"
    },
    {
      "cve": "CVE-2025-21758",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21758 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21758.json"
        }
      ],
      "title": "CVE-2025-21758"
    },
    {
      "cve": "CVE-2025-21765",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21765 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21765.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21765"
    },
    {
      "cve": "CVE-2025-21766",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21766 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21766.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21766"
    },
    {
      "cve": "CVE-2025-21767",
      "cwe": {
        "id": "CWE-332",
        "name": "Insufficient Entropy in PRNG"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Entropy in PRNG",
          "title": "CWE-332"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21767 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21767.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21767"
    },
    {
      "cve": "CVE-2025-21795",
      "cwe": {
        "id": "CWE-371",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-371",
          "title": "CWE-371"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21795 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21795.json"
        }
      ],
      "title": "CVE-2025-21795"
    },
    {
      "cve": "CVE-2025-21796",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21796 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21796.json"
        }
      ],
      "title": "CVE-2025-21796"
    },
    {
      "cve": "CVE-2025-21848",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Use of NullPointerException Catch to Detect NULL Pointer Dereference",
          "title": "CWE-395"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21848 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21848.json"
        }
      ],
      "title": "CVE-2025-21848"
    },
    {
      "cve": "CVE-2025-21862",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Initialization",
          "title": "CWE-665"
        },
        {
          "category": "other",
          "text": "Use of Uninitialized Resource",
          "title": "CWE-908"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21862 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21862.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21862"
    },
    {
      "cve": "CVE-2025-21864",
      "cwe": {
        "id": "CWE-371",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-371",
          "title": "CWE-371"
        },
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21864 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21864.json"
        }
      ],
      "title": "CVE-2025-21864"
    },
    {
      "cve": "CVE-2025-21865",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21865 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21865.json"
        }
      ],
      "title": "CVE-2025-21865"
    },
    {
      "cve": "CVE-2025-26465",
      "cwe": {
        "id": "CWE-310",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-310",
          "title": "CWE-310"
        },
        {
          "category": "other",
          "text": "Detection of Error Condition Without Action",
          "title": "CWE-390"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26465 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26465.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-26465"
    },
    {
      "cve": "CVE-2025-31115",
      "cwe": {
        "id": "CWE-366",
        "name": "Race Condition within a Thread"
      },
      "notes": [
        {
          "category": "other",
          "text": "Race Condition within a Thread",
          "title": "CWE-366"
        },
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "other",
          "text": "Premature Release of Resource During Expected Lifetime",
          "title": "CWE-826"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-31115 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31115.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-31115"
    },
    {
      "cve": "CVE-2025-32454",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-32454 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32454.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-32454"
    },
    {
      "cve": "CVE-2025-40567",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-40567 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40567.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-40567"
    },
    {
      "cve": "CVE-2025-40568",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-40568 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40568.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-40568"
    },
    {
      "cve": "CVE-2025-40569",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-40569 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40569.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-40569"
    },
    {
      "cve": "CVE-2025-40585",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Default Permissions",
          "title": "CWE-276"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-40585 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40585.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-40585"
    },
    {
      "cve": "CVE-2025-46836",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-46836 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46836.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-46836"
    }
  ]
}
  ghsa-xv46-47mw-9vxc
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
ipv6: mcast: add RCU protection to mld_newpack()
mld_newpack() can be called without RTNL or RCU being held.
Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.
Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
{
  "affected": [],
  "aliases": [
    "CVE-2025-21758"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-02-27T03:15:16Z",
    "severity": "MODERATE"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: mcast: add RCU protection to mld_newpack()\n\nmld_newpack() can be called without RTNL or RCU being held.\n\nNote that we no longer can use sock_alloc_send_skb() because\nipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.\n\nInstead use alloc_skb() and charge the net-\u003eipv6.igmp_sk\nsocket under RCU protection.",
  "id": "GHSA-xv46-47mw-9vxc",
  "modified": "2025-10-28T21:30:28Z",
  "published": "2025-02-27T03:34:05Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21758"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.