Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-21864 (GCVE-0-2025-21864)
Vulnerability from cvelistv5
{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-21864",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-01T19:25:34.148914Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-476",
                "description": "CWE-476 NULL Pointer Dereference",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-01T19:26:37.158Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "include/net/tcp.h",
            "net/ipv4/tcp_fastopen.c",
            "net/ipv4/tcp_input.c",
            "net/ipv4/tcp_ipv4.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "87858bbf21da239ace300d61dd209907995c0491",
              "status": "affected",
              "version": "68822bdf76f10c3dc80609d4e2cdc1e847429086",
              "versionType": "git"
            },
            {
              "lessThan": "f1d5e6a5e468308af7759cf5276779d3155c5e98",
              "status": "affected",
              "version": "68822bdf76f10c3dc80609d4e2cdc1e847429086",
              "versionType": "git"
            },
            {
              "lessThan": "cd34a07f744451e2ecf9005bb7d24d0b2fb83656",
              "status": "affected",
              "version": "68822bdf76f10c3dc80609d4e2cdc1e847429086",
              "versionType": "git"
            },
            {
              "lessThan": "69cafd9413084cd5012cf5d7c7ec6f3d493726d9",
              "status": "affected",
              "version": "68822bdf76f10c3dc80609d4e2cdc1e847429086",
              "versionType": "git"
            },
            {
              "lessThan": "9b6412e6979f6f9e0632075f8f008937b5cd4efd",
              "status": "affected",
              "version": "68822bdf76f10c3dc80609d4e2cdc1e847429086",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "include/net/tcp.h",
            "net/ipv4/tcp_fastopen.c",
            "net/ipv4/tcp_input.c",
            "net/ipv4/tcp_ipv4.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.19"
            },
            {
              "lessThan": "5.19",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.130",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.80",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.17",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.13.*",
              "status": "unaffected",
              "version": "6.13.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.14",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.130",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.80",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.17",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13.5",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: drop secpath at the same time as we currently drop dst\n\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\nrunning tests that boil down to:\n - create a pair of netns\n - run a basic TCP test over ipcomp6\n - delete the pair of netns\n\nThe xfrm_state found on spi_byaddr was not deleted at the time we\ndelete the netns, because we still have a reference on it. This\nlingering reference comes from a secpath (which holds a ref on the\nxfrm_state), which is still attached to an skb. This skb is not\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\nskb_attempt_defer_free.\n\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\nthat case, we still have a reference on the xfrm_state that we don\u0027t\nexpect at this point.\n\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\nlonger needed, so let\u0027s also drop the secpath. At this point,\ntcp_filter has already called into the LSM hooks that may require the\nsecpath, so it should not be needed anymore. However, in some of those\nplaces, the MPTCP extension has just been attached to the skb, so we\ncannot simply drop all extensions."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:22:47.376Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/87858bbf21da239ace300d61dd209907995c0491"
        },
        {
          "url": "https://git.kernel.org/stable/c/f1d5e6a5e468308af7759cf5276779d3155c5e98"
        },
        {
          "url": "https://git.kernel.org/stable/c/cd34a07f744451e2ecf9005bb7d24d0b2fb83656"
        },
        {
          "url": "https://git.kernel.org/stable/c/69cafd9413084cd5012cf5d7c7ec6f3d493726d9"
        },
        {
          "url": "https://git.kernel.org/stable/c/9b6412e6979f6f9e0632075f8f008937b5cd4efd"
        }
      ],
      "title": "tcp: drop secpath at the same time as we currently drop dst",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-21864",
    "datePublished": "2025-03-12T09:42:21.223Z",
    "dateReserved": "2024-12-29T08:45:45.780Z",
    "dateUpdated": "2025-10-01T19:26:37.158Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-21864\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-03-12T10:15:19.520\",\"lastModified\":\"2025-10-01T20:18:30.997\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntcp: drop secpath at the same time as we currently drop dst\\n\\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\\nrunning tests that boil down to:\\n - create a pair of netns\\n - run a basic TCP test over ipcomp6\\n - delete the pair of netns\\n\\nThe xfrm_state found on spi_byaddr was not deleted at the time we\\ndelete the netns, because we still have a reference on it. This\\nlingering reference comes from a secpath (which holds a ref on the\\nxfrm_state), which is still attached to an skb. This skb is not\\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\\nskb_attempt_defer_free.\\n\\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\\nthat case, we still have a reference on the xfrm_state that we don\u0027t\\nexpect at this point.\\n\\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\\nlonger needed, so let\u0027s also drop the secpath. At this point,\\ntcp_filter has already called into the LSM hooks that may require the\\nsecpath, so it should not be needed anymore. However, in some of those\\nplaces, the MPTCP extension has just been attached to the skb, so we\\ncannot simply drop all extensions.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: descartar secpath al mismo tiempo que descartamos dst Xiumei inform\u00f3 haber alcanzado el WARN en xfrm6_tunnel_net_exit mientras ejecutaba pruebas que se reducen a: - crear un par de netns - ejecutar una prueba TCP b\u00e1sica sobre ipcomp6 - eliminar el par de netns El xfrm_state encontrado en spi_byaddr no se elimin\u00f3 en el momento en que eliminamos los netns, porque a\u00fan tenemos una referencia en \u00e9l. Esta referencia persistente proviene de un secpath (que contiene una referencia en xfrm_state), que a\u00fan est\u00e1 adjunto a un skb. Este skb no se filtra, termina en sk_receive_queue y luego se libera mediante skb_attempt_defer_free. El problema ocurre cuando posponemos la liberaci\u00f3n de un skb (insertarlo en la lista defer_list de una CPU) y no limpiamos esa lista antes de eliminar netns. En ese caso, a\u00fan tenemos una referencia en xfrm_state inesperada en este momento. Ya eliminamos el dst del skb en la ruta de recepci\u00f3n TCP cuando ya no es necesario, as\u00ed que tambi\u00e9n eliminamos el secpath. En este punto, tcp_filter ya ha llamado a los ganchos LSM que podr\u00edan requerir el secpath, por lo que ya no deber\u00eda ser necesario. Sin embargo, en algunos de esos lugares, la extensi\u00f3n MPTCP se acaba de adjuntar al skb, por lo que no podemos simplemente eliminar todas las extensiones.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.19\",\"versionEndExcluding\":\"6.1.130\",\"matchCriteriaId\":\"5B2819D9-E557-41EC-A77B-F5A5992BBC20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.80\",\"matchCriteriaId\":\"A93F3655-6FAF-43B0-8541-A212998F05B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.17\",\"matchCriteriaId\":\"15370AEE-6D1C-49C3-8CB7-E889D5F92B6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.13\",\"versionEndExcluding\":\"6.13.5\",\"matchCriteriaId\":\"72E69ABB-9015-43A6-87E1-5150383CFFD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"186716B6-2B66-4BD0-852E-D48E71C0C85F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3E781C-403A-498F-9DA9-ECEE50F41E75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"66619FB8-0AAF-4166-B2CF-67B24143261D\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/69cafd9413084cd5012cf5d7c7ec6f3d493726d9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/87858bbf21da239ace300d61dd209907995c0491\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9b6412e6979f6f9e0632075f8f008937b5cd4efd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/cd34a07f744451e2ecf9005bb7d24d0b2fb83656\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f1d5e6a5e468308af7759cf5276779d3155c5e98\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-21864\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-01T19:25:34.148914Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-476\", \"description\": \"CWE-476 NULL Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-01T16:58:42.237Z\"}}], \"cna\": {\"title\": \"tcp: drop secpath at the same time as we currently drop dst\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"68822bdf76f10c3dc80609d4e2cdc1e847429086\", \"lessThan\": \"87858bbf21da239ace300d61dd209907995c0491\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"68822bdf76f10c3dc80609d4e2cdc1e847429086\", \"lessThan\": \"f1d5e6a5e468308af7759cf5276779d3155c5e98\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"68822bdf76f10c3dc80609d4e2cdc1e847429086\", \"lessThan\": \"cd34a07f744451e2ecf9005bb7d24d0b2fb83656\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"68822bdf76f10c3dc80609d4e2cdc1e847429086\", \"lessThan\": \"69cafd9413084cd5012cf5d7c7ec6f3d493726d9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"68822bdf76f10c3dc80609d4e2cdc1e847429086\", \"lessThan\": \"9b6412e6979f6f9e0632075f8f008937b5cd4efd\", \"versionType\": \"git\"}], \"programFiles\": [\"include/net/tcp.h\", \"net/ipv4/tcp_fastopen.c\", \"net/ipv4/tcp_input.c\", \"net/ipv4/tcp_ipv4.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.19\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.19\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.1.130\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.80\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12.17\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.12.*\"}, {\"status\": \"unaffected\", \"version\": \"6.13.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.13.*\"}, {\"status\": \"unaffected\", \"version\": \"6.14\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"include/net/tcp.h\", \"net/ipv4/tcp_fastopen.c\", \"net/ipv4/tcp_input.c\", \"net/ipv4/tcp_ipv4.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/87858bbf21da239ace300d61dd209907995c0491\"}, {\"url\": \"https://git.kernel.org/stable/c/f1d5e6a5e468308af7759cf5276779d3155c5e98\"}, {\"url\": \"https://git.kernel.org/stable/c/cd34a07f744451e2ecf9005bb7d24d0b2fb83656\"}, {\"url\": \"https://git.kernel.org/stable/c/69cafd9413084cd5012cf5d7c7ec6f3d493726d9\"}, {\"url\": \"https://git.kernel.org/stable/c/9b6412e6979f6f9e0632075f8f008937b5cd4efd\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntcp: drop secpath at the same time as we currently drop dst\\n\\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\\nrunning tests that boil down to:\\n - create a pair of netns\\n - run a basic TCP test over ipcomp6\\n - delete the pair of netns\\n\\nThe xfrm_state found on spi_byaddr was not deleted at the time we\\ndelete the netns, because we still have a reference on it. This\\nlingering reference comes from a secpath (which holds a ref on the\\nxfrm_state), which is still attached to an skb. This skb is not\\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\\nskb_attempt_defer_free.\\n\\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\\nthat case, we still have a reference on the xfrm_state that we don\u0027t\\nexpect at this point.\\n\\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\\nlonger needed, so let\u0027s also drop the secpath. At this point,\\ntcp_filter has already called into the LSM hooks that may require the\\nsecpath, so it should not be needed anymore. However, in some of those\\nplaces, the MPTCP extension has just been attached to the skb, so we\\ncannot simply drop all extensions.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.130\", \"versionStartIncluding\": \"5.19\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.80\", \"versionStartIncluding\": \"5.19\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12.17\", \"versionStartIncluding\": \"5.19\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.13.5\", \"versionStartIncluding\": \"5.19\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.14\", \"versionStartIncluding\": \"5.19\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T07:22:47.376Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-21864\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-01T19:26:37.158Z\", \"dateReserved\": \"2024-12-29T08:45:45.780Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-03-12T09:42:21.223Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  ssa-082556
Vulnerability from csaf_siemens
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1.5 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nSiemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
      },
      {
        "category": "self",
        "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-082556.json"
      }
    ],
    "title": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5",
    "tracking": {
      "current_release_date": "2025-08-12T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-082556",
      "initial_release_date": "2025-06-10T00:00:00Z",
      "revision_history": [
        {
          "date": "2025-06-10T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2025-08-12T00:00:00Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added CVE-2025-6395, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990"
        }
      ],
      "status": "interim",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)",
                  "product_id": "1",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)",
                  "product_id": "2",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)",
                  "product_id": "3",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)",
                  "product_id": "4",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)",
                  "product_id": "5",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6AG1518-4AX00-4AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-41617",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-41617"
    },
    {
      "cve": "CVE-2023-4527",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4527"
    },
    {
      "cve": "CVE-2023-4806",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4806"
    },
    {
      "cve": "CVE-2023-4911",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4911"
    },
    {
      "cve": "CVE-2023-5363",
      "cwe": {
        "id": "CWE-684",
        "name": "Incorrect Provision of Specified Functionality"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST\u0027s SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2023-6246",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6246"
    },
    {
      "cve": "CVE-2023-6779",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6779"
    },
    {
      "cve": "CVE-2023-6780",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6780"
    },
    {
      "cve": "CVE-2023-28531",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-28531"
    },
    {
      "cve": "CVE-2023-38545",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "cwe": {
        "id": "CWE-73",
        "name": "External Control of File Name or Path"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-46218",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51384",
      "cwe": {
        "id": "CWE-304",
        "name": "Missing Critical Step in Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-51384"
    },
    {
      "cve": "CVE-2023-51385",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-51385"
    },
    {
      "cve": "CVE-2023-52927",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the exp not to be removed when the created ct will not be confirmed, like in OVS and TC conntrack in the following patches. This patch allows exp not to be removed by setting IPS_CONFIRMED in the status of the tmpl.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52927"
    },
    {
      "cve": "CVE-2024-2961",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-6119",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don\u0027t perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-6119"
    },
    {
      "cve": "CVE-2024-6387",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A security regression (CVE-2006-5051) was discovered in OpenSSH\u0027s server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-12133",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-12133"
    },
    {
      "cve": "CVE-2024-12243",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-12243"
    },
    {
      "cve": "CVE-2024-24855",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A race condition was found in the Linux kernel\u0027s scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-24855"
    },
    {
      "cve": "CVE-2024-26596",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: dsa: netdev_priv() dereference before check on non-DSA netdevice events.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26596"
    },
    {
      "cve": "CVE-2024-28085",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-33599",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow.  This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference.  This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients.  The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34397",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-34397"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-45490",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-45490"
    },
    {
      "cve": "CVE-2024-45491",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-45491"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-50246",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/ntfs3: Add rough attr alloc_size check",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50246"
    },
    {
      "cve": "CVE-2024-53166",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "block, bfq: bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq from bic without the lock, this can lead to UAF if the io_context is shared by multiple tasks.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-53166"
    },
    {
      "cve": "CVE-2024-57977",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "memcg: A soft lockup vulnerability in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup was triggered.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-57977"
    },
    {
      "cve": "CVE-2024-57996",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net_sched: sch_sfq: vulnerability caused by incorrectly handling a packet limit of 1, leading to an array-index-out-of-bounds error and subsequent crash when the queue length is decremented for an empty slot.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-57996"
    },
    {
      "cve": "CVE-2024-58005",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "tpm: Change to kvalloc() in eventlog/acpi.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-58005"
    },
    {
      "cve": "CVE-2025-4373",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GLib is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-4373"
    },
    {
      "cve": "CVE-2025-4598",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\r\n\r\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-4598"
    },
    {
      "cve": "CVE-2025-6395",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-6395"
    },
    {
      "cve": "CVE-2025-21701",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: vulnerability arises because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, leading to potential use of destroyed locks, which is fixed by denying operations on devices being unregistered.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21701"
    },
    {
      "cve": "CVE-2025-21702",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21702"
    },
    {
      "cve": "CVE-2025-21712",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "md/md-bitmap: vulnerability caused by bitmap_get_stats() can be called even if the bitmap is destroyed or not fully initialized, leading to a kernel crash, which is fixed by synchronizing bitmap_get_stats() with bitmap_info.mutex.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21712"
    },
    {
      "cve": "CVE-2025-21724",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index(). Resolve a UBSAN shift-out-of-bounds issue in iova_bitmap_offset_to_index() where shifting the constant \"1\" (of type int) by bitmap-\u003emapped.pgshift (an unsigned long value) could result in undefined behavior. The constant \"1\" defaults to a 32-bit \"int\", and when \"pgshift\" exceeds 31 (e.g., pgshift = 63) the shift operation overflows, as the result cannot be represented in a 32-bit type.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21724"
    },
    {
      "cve": "CVE-2025-21728",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21728"
    },
    {
      "cve": "CVE-2025-21745",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix class @block_class\u0027s subsystem refcount leakage\r\n\r\nblkcg_fill_root_iostats() iterates over @block_class\u0027s devices by\r\nclass_dev_iter_(init|next)(), but does not end iterating with\r\nclass_dev_iter_exit(), so causes the class\u0027s subsystem refcount leakage.\r\n\r\nFix by ending the iterating with class_dev_iter_exit().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21745"
    },
    {
      "cve": "CVE-2025-21756",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21756"
    },
    {
      "cve": "CVE-2025-21758",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21758"
    },
    {
      "cve": "CVE-2025-21765",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21765"
    },
    {
      "cve": "CVE-2025-21766",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv4: use RCU protection in __ip_rt_update_pmtu(). __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21766"
    },
    {
      "cve": "CVE-2025-21767",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context The following bug report happened with a PREEMPT_RT kernel: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 get_random_u32+0x4f/0x110 clocksource_verify_choose_cpus+0xab/0x1a0 clocksource_verify_percpu.part.0+0x6b/0x330 clocksource_watchdog_kthread+0x193/0x1a0 It is due to the fact that clocksource_verify_choose_cpus() is invoked with preemption disabled. This function invokes get_random_u32() to obtain random numbers for choosing CPUs. The batched_entropy_32 local lock and/or the base_crng.lock spinlock in driver/char/random.c will be acquired during the call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot be acquired in atomic context. Fix this problem by using migrate_disable() to allow smp_processor_id() to be reliably used without introducing atomic context. preempt_disable() is then called after clocksource_verify_choose_cpus() but before the clocksource measurement is being run to avoid introducing unexpected latency.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21767"
    },
    {
      "cve": "CVE-2025-21795",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "NFSD: hang in nfsd4_shutdown_callback. If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21795"
    },
    {
      "cve": "CVE-2025-21796",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nfsd: clear acl_access/acl_default after releasing them If getting acl_default fails, acl_access and acl_default will be released simultaneously.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21796"
    },
    {
      "cve": "CVE-2025-21848",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfp: bpf: Add check for nfp_app_ctrl_msg_alloc()\r\n\r\nAdd check for the return value of nfp_app_ctrl_msg_alloc() in\r\nnfp_bpf_cmsg_alloc() to prevent null pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21848"
    },
    {
      "cve": "CVE-2025-21862",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "drop_monitor: incorrect initialization order. If drop_monitor is built as a kernel module, syzkaller may have time to send a netlink NET_DM_CMD_START message during the module loading. This will call the net_dm_monitor_start() function that uses a spinlock that has not yet been initialized.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21862"
    },
    {
      "cve": "CVE-2025-21864",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: drop secpath at the same time as we currently drop dst\r\n\r\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\r\nrunning tests that boil down to:\r\n - create a pair of netns\r\n - run a basic TCP test over ipcomp6\r\n - delete the pair of netns\r\n\r\nThe xfrm_state found on spi_byaddr was not deleted at the time we\r\ndelete the netns, because we still have a reference on it. This\r\nlingering reference comes from a secpath (which holds a ref on the\r\nxfrm_state), which is still attached to an skb. This skb is not\r\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\r\nskb_attempt_defer_free.\r\n\r\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\r\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\r\nthat case, we still have a reference on the xfrm_state that we don\u0027t\r\nexpect at this point.\r\n\r\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\r\nlonger needed, so let\u0027s also drop the secpath. At this point,\r\ntcp_filter has already called into the LSM hooks that may require the\r\nsecpath, so it should not be needed anymore. However, in some of those\r\nplaces, the MPTCP extension has just been attached to the skb, so we\r\ncannot simply drop all extensions.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21864"
    },
    {
      "cve": "CVE-2025-21865",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Commit eb28fd76c0a0 (\"gtp: Destroy device along with udp socket\u0027s netns dismantle.\") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl() to destroy devices in each netns as done in geneve and ip tunnels. However, this could trigger -\u003edellink() twice for the same device during -\u003eexit_batch_rtnl().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21865"
    },
    {
      "cve": "CVE-2025-26465",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-26465"
    },
    {
      "cve": "CVE-2025-31115",
      "cwe": {
        "id": "CWE-826",
        "name": "Premature Release of Resource During Expected Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The threaded .xz decoder in liblzma has a vulnerability that can at least result in a crash (denial of service). The effects include heap use after free and writing to an address based on the null pointer plus an offset.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-31115"
    },
    {
      "cve": "CVE-2025-32988",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-32988"
    },
    {
      "cve": "CVE-2025-32989",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-32989"
    },
    {
      "cve": "CVE-2025-46836",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net-tools is a collection of programs that form the base set of the NET-3 networking distribution for the Linux operating system. Inn versions up to and including 2.10, the Linux network utilities (like ifconfig) from the net-tools package do not properly validate the structure of /proc files when showing interfaces. `get_name()` in `interface.c` copies interface labels from `/proc/net/dev` into a fixed 16-byte stack buffer without bounds checking, leading to possible arbitrary code execution or crash. The known attack path does not require privilege but also does not provide privilege escalation in this scenario. A patch is available and expected to be part of version 2.20.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-46836"
    }
  ]
}
  CERTFR-2025-AVI-0307
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | N/A | Public Cloud Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Manager Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 | 
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Desktop 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Proxy 4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Basesystem Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Real Time Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Public Cloud Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Retail Branch Server 4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Server 4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Legacy Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Development Tools Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2017-5753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
    },
    {
      "name": "CVE-2020-27835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27835"
    },
    {
      "name": "CVE-2022-1016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
    },
    {
      "name": "CVE-2022-1184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
    },
    {
      "name": "CVE-2022-1048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
    },
    {
      "name": "CVE-2022-0168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0168"
    },
    {
      "name": "CVE-2022-3435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
    },
    {
      "name": "CVE-2022-29901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
    },
    {
      "name": "CVE-2022-29900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
    },
    {
      "name": "CVE-2022-2977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
    },
    {
      "name": "CVE-2022-3303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
    },
    {
      "name": "CVE-2023-0179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
    },
    {
      "name": "CVE-2023-1652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1652"
    },
    {
      "name": "CVE-2023-28410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
    },
    {
      "name": "CVE-2023-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
    },
    {
      "name": "CVE-2023-3567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
    },
    {
      "name": "CVE-2024-2201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
    },
    {
      "name": "CVE-2024-26634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26634"
    },
    {
      "name": "CVE-2021-47248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47248"
    },
    {
      "name": "CVE-2024-35910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
    },
    {
      "name": "CVE-2024-26873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26873"
    },
    {
      "name": "CVE-2024-35826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
    },
    {
      "name": "CVE-2024-41005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
    },
    {
      "name": "CVE-2024-38606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
    },
    {
      "name": "CVE-2024-41077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
    },
    {
      "name": "CVE-2024-42229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
    },
    {
      "name": "CVE-2024-41092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
    },
    {
      "name": "CVE-2024-42098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42098"
    },
    {
      "name": "CVE-2024-42240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
    },
    {
      "name": "CVE-2021-47517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
    },
    {
      "name": "CVE-2024-46782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
    },
    {
      "name": "CVE-2024-50126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
    },
    {
      "name": "CVE-2024-50290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
    },
    {
      "name": "CVE-2024-53057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
    },
    {
      "name": "CVE-2024-53063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
    },
    {
      "name": "CVE-2024-42307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307"
    },
    {
      "name": "CVE-2024-43820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
    },
    {
      "name": "CVE-2024-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
    },
    {
      "name": "CVE-2024-47678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
    },
    {
      "name": "CVE-2024-53140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
    },
    {
      "name": "CVE-2024-53064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
    },
    {
      "name": "CVE-2024-56642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56642"
    },
    {
      "name": "CVE-2024-56651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56651"
    },
    {
      "name": "CVE-2024-49994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
    },
    {
      "name": "CVE-2024-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
    },
    {
      "name": "CVE-2024-56703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
    },
    {
      "name": "CVE-2025-21631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21631"
    },
    {
      "name": "CVE-2025-21671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
    },
    {
      "name": "CVE-2024-49940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
    },
    {
      "name": "CVE-2024-50056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
    },
    {
      "name": "CVE-2024-50140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50140"
    },
    {
      "name": "CVE-2024-50152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
    },
    {
      "name": "CVE-2024-53163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53163"
    },
    {
      "name": "CVE-2024-53176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
    },
    {
      "name": "CVE-2024-53178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
    },
    {
      "name": "CVE-2024-56702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2023-52926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
    },
    {
      "name": "CVE-2024-47408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47408"
    },
    {
      "name": "CVE-2024-49571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49571"
    },
    {
      "name": "CVE-2024-53680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
    },
    {
      "name": "CVE-2024-56640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
    },
    {
      "name": "CVE-2024-56718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
    },
    {
      "name": "CVE-2024-56770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
    },
    {
      "name": "CVE-2024-57807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57807"
    },
    {
      "name": "CVE-2024-57900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57900"
    },
    {
      "name": "CVE-2021-47633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47633"
    },
    {
      "name": "CVE-2021-47644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47644"
    },
    {
      "name": "CVE-2022-49076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49076"
    },
    {
      "name": "CVE-2022-49089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
    },
    {
      "name": "CVE-2022-49134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
    },
    {
      "name": "CVE-2022-49135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49135"
    },
    {
      "name": "CVE-2022-49151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49151"
    },
    {
      "name": "CVE-2022-49178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
    },
    {
      "name": "CVE-2022-49182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49182"
    },
    {
      "name": "CVE-2022-49201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49201"
    },
    {
      "name": "CVE-2022-49247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49247"
    },
    {
      "name": "CVE-2022-49490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49490"
    },
    {
      "name": "CVE-2022-49626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49626"
    },
    {
      "name": "CVE-2022-49661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49661"
    },
    {
      "name": "CVE-2024-57979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
    },
    {
      "name": "CVE-2025-21733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2025-21754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
    },
    {
      "name": "CVE-2021-4453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4453"
    },
    {
      "name": "CVE-2021-47631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47631"
    },
    {
      "name": "CVE-2021-47632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47632"
    },
    {
      "name": "CVE-2021-47635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47635"
    },
    {
      "name": "CVE-2021-47636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47636"
    },
    {
      "name": "CVE-2021-47637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47637"
    },
    {
      "name": "CVE-2021-47638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47638"
    },
    {
      "name": "CVE-2021-47639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47639"
    },
    {
      "name": "CVE-2021-47641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47641"
    },
    {
      "name": "CVE-2021-47642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47642"
    },
    {
      "name": "CVE-2021-47643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47643"
    },
    {
      "name": "CVE-2021-47645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47645"
    },
    {
      "name": "CVE-2021-47646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47646"
    },
    {
      "name": "CVE-2021-47647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47647"
    },
    {
      "name": "CVE-2021-47648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
    },
    {
      "name": "CVE-2021-47649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
    },
    {
      "name": "CVE-2021-47650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
    },
    {
      "name": "CVE-2021-47651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47651"
    },
    {
      "name": "CVE-2021-47652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47652"
    },
    {
      "name": "CVE-2021-47653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47653"
    },
    {
      "name": "CVE-2021-47654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47654"
    },
    {
      "name": "CVE-2021-47656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47656"
    },
    {
      "name": "CVE-2021-47657",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47657"
    },
    {
      "name": "CVE-2021-47659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
    },
    {
      "name": "CVE-2022-0995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0995"
    },
    {
      "name": "CVE-2022-49044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49044"
    },
    {
      "name": "CVE-2022-49050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49050"
    },
    {
      "name": "CVE-2022-49051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49051"
    },
    {
      "name": "CVE-2022-49054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49054"
    },
    {
      "name": "CVE-2022-49055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49055"
    },
    {
      "name": "CVE-2022-49058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
    },
    {
      "name": "CVE-2022-49059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49059"
    },
    {
      "name": "CVE-2022-49060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49060"
    },
    {
      "name": "CVE-2022-49061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2022-49065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
    },
    {
      "name": "CVE-2022-49066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
    },
    {
      "name": "CVE-2022-49073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49073"
    },
    {
      "name": "CVE-2022-49074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
    },
    {
      "name": "CVE-2022-49078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49078"
    },
    {
      "name": "CVE-2022-49082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49082"
    },
    {
      "name": "CVE-2022-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49083"
    },
    {
      "name": "CVE-2022-49084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49084"
    },
    {
      "name": "CVE-2022-49085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49085"
    },
    {
      "name": "CVE-2022-49086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
    },
    {
      "name": "CVE-2022-49088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49088"
    },
    {
      "name": "CVE-2022-49090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
    },
    {
      "name": "CVE-2022-49091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49091"
    },
    {
      "name": "CVE-2022-49092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
    },
    {
      "name": "CVE-2022-49093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49093"
    },
    {
      "name": "CVE-2022-49095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49095"
    },
    {
      "name": "CVE-2022-49096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49096"
    },
    {
      "name": "CVE-2022-49097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
    },
    {
      "name": "CVE-2022-49098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49098"
    },
    {
      "name": "CVE-2022-49099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49099"
    },
    {
      "name": "CVE-2022-49100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
    },
    {
      "name": "CVE-2022-49102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49102"
    },
    {
      "name": "CVE-2022-49103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
    },
    {
      "name": "CVE-2022-49104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49104"
    },
    {
      "name": "CVE-2022-49105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49105"
    },
    {
      "name": "CVE-2022-49106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49106"
    },
    {
      "name": "CVE-2022-49107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
    },
    {
      "name": "CVE-2022-49109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49109"
    },
    {
      "name": "CVE-2022-49111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49111"
    },
    {
      "name": "CVE-2022-49112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49112"
    },
    {
      "name": "CVE-2022-49113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49113"
    },
    {
      "name": "CVE-2022-49114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49114"
    },
    {
      "name": "CVE-2022-49115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49115"
    },
    {
      "name": "CVE-2022-49116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49116"
    },
    {
      "name": "CVE-2022-49118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
    },
    {
      "name": "CVE-2022-49119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49119"
    },
    {
      "name": "CVE-2022-49120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49120"
    },
    {
      "name": "CVE-2022-49121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49121"
    },
    {
      "name": "CVE-2022-49122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
    },
    {
      "name": "CVE-2022-49126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49126"
    },
    {
      "name": "CVE-2022-49128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49128"
    },
    {
      "name": "CVE-2022-49129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49129"
    },
    {
      "name": "CVE-2022-49130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
    },
    {
      "name": "CVE-2022-49131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49131"
    },
    {
      "name": "CVE-2022-49132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49132"
    },
    {
      "name": "CVE-2022-49137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49137"
    },
    {
      "name": "CVE-2022-49145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
    },
    {
      "name": "CVE-2022-49147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
    },
    {
      "name": "CVE-2022-49148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
    },
    {
      "name": "CVE-2022-49153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
    },
    {
      "name": "CVE-2022-49154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
    },
    {
      "name": "CVE-2022-49155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
    },
    {
      "name": "CVE-2022-49156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
    },
    {
      "name": "CVE-2022-49157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49157"
    },
    {
      "name": "CVE-2022-49158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49158"
    },
    {
      "name": "CVE-2022-49159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
    },
    {
      "name": "CVE-2022-49160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49160"
    },
    {
      "name": "CVE-2022-49162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49162"
    },
    {
      "name": "CVE-2022-49163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49163"
    },
    {
      "name": "CVE-2022-49164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49164"
    },
    {
      "name": "CVE-2022-49165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49165"
    },
    {
      "name": "CVE-2022-49174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
    },
    {
      "name": "CVE-2022-49175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
    },
    {
      "name": "CVE-2022-49176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49176"
    },
    {
      "name": "CVE-2022-49177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
    },
    {
      "name": "CVE-2022-49179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49179"
    },
    {
      "name": "CVE-2022-49180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
    },
    {
      "name": "CVE-2022-49185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49185"
    },
    {
      "name": "CVE-2022-49187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
    },
    {
      "name": "CVE-2022-49188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
    },
    {
      "name": "CVE-2022-49189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49189"
    },
    {
      "name": "CVE-2022-49193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49193"
    },
    {
      "name": "CVE-2022-49194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49194"
    },
    {
      "name": "CVE-2022-49196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49196"
    },
    {
      "name": "CVE-2022-49199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49199"
    },
    {
      "name": "CVE-2022-49200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49200"
    },
    {
      "name": "CVE-2022-49206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
    },
    {
      "name": "CVE-2022-49208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
    },
    {
      "name": "CVE-2022-49212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49212"
    },
    {
      "name": "CVE-2022-49213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49213"
    },
    {
      "name": "CVE-2022-49214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49214"
    },
    {
      "name": "CVE-2022-49216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
    },
    {
      "name": "CVE-2022-49217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49217"
    },
    {
      "name": "CVE-2022-49218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
    },
    {
      "name": "CVE-2022-49221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49221"
    },
    {
      "name": "CVE-2022-49222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49222"
    },
    {
      "name": "CVE-2022-49224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49224"
    },
    {
      "name": "CVE-2022-49226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49226"
    },
    {
      "name": "CVE-2022-49227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
    },
    {
      "name": "CVE-2022-49232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49232"
    },
    {
      "name": "CVE-2022-49235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49235"
    },
    {
      "name": "CVE-2022-49236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49236"
    },
    {
      "name": "CVE-2022-49239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49239"
    },
    {
      "name": "CVE-2022-49241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49241"
    },
    {
      "name": "CVE-2022-49242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49242"
    },
    {
      "name": "CVE-2022-49243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49243"
    },
    {
      "name": "CVE-2022-49244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49244"
    },
    {
      "name": "CVE-2022-49246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49246"
    },
    {
      "name": "CVE-2022-49248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49248"
    },
    {
      "name": "CVE-2022-49249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49249"
    },
    {
      "name": "CVE-2022-49250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49250"
    },
    {
      "name": "CVE-2022-49251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49251"
    },
    {
      "name": "CVE-2022-49252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49252"
    },
    {
      "name": "CVE-2022-49253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49253"
    },
    {
      "name": "CVE-2022-49254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49254"
    },
    {
      "name": "CVE-2022-49256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49256"
    },
    {
      "name": "CVE-2022-49257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
    },
    {
      "name": "CVE-2022-49258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49258"
    },
    {
      "name": "CVE-2022-49259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
    },
    {
      "name": "CVE-2022-49260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49260"
    },
    {
      "name": "CVE-2022-49261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49261"
    },
    {
      "name": "CVE-2022-49262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
    },
    {
      "name": "CVE-2022-49263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
    },
    {
      "name": "CVE-2022-49264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
    },
    {
      "name": "CVE-2022-49265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49265"
    },
    {
      "name": "CVE-2022-49266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
    },
    {
      "name": "CVE-2022-49268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
    },
    {
      "name": "CVE-2022-49269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
    },
    {
      "name": "CVE-2022-49270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49270"
    },
    {
      "name": "CVE-2022-49271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49271"
    },
    {
      "name": "CVE-2022-49272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
    },
    {
      "name": "CVE-2022-49273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
    },
    {
      "name": "CVE-2022-49274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49274"
    },
    {
      "name": "CVE-2022-49275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49275"
    },
    {
      "name": "CVE-2022-49276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49276"
    },
    {
      "name": "CVE-2022-49277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49277"
    },
    {
      "name": "CVE-2022-49278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49278"
    },
    {
      "name": "CVE-2022-49279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
    },
    {
      "name": "CVE-2022-49280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49280"
    },
    {
      "name": "CVE-2022-49281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49281"
    },
    {
      "name": "CVE-2022-49283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49283"
    },
    {
      "name": "CVE-2022-49285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49285"
    },
    {
      "name": "CVE-2022-49286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
    },
    {
      "name": "CVE-2022-49287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49287"
    },
    {
      "name": "CVE-2022-49288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49288"
    },
    {
      "name": "CVE-2022-49290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
    },
    {
      "name": "CVE-2022-49291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49291"
    },
    {
      "name": "CVE-2022-49292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49292"
    },
    {
      "name": "CVE-2022-49294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49294"
    },
    {
      "name": "CVE-2022-49295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49295"
    },
    {
      "name": "CVE-2022-49297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
    },
    {
      "name": "CVE-2022-49298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49298"
    },
    {
      "name": "CVE-2022-49299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49299"
    },
    {
      "name": "CVE-2022-49300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49300"
    },
    {
      "name": "CVE-2022-49301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49301"
    },
    {
      "name": "CVE-2022-49302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49302"
    },
    {
      "name": "CVE-2022-49304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49304"
    },
    {
      "name": "CVE-2022-49305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49305"
    },
    {
      "name": "CVE-2022-49307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
    },
    {
      "name": "CVE-2022-49308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
    },
    {
      "name": "CVE-2022-49309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49309"
    },
    {
      "name": "CVE-2022-49310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49310"
    },
    {
      "name": "CVE-2022-49311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49311"
    },
    {
      "name": "CVE-2022-49312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49312"
    },
    {
      "name": "CVE-2022-49313",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49313"
    },
    {
      "name": "CVE-2022-49314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49314"
    },
    {
      "name": "CVE-2022-49315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49315"
    },
    {
      "name": "CVE-2022-49316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49316"
    },
    {
      "name": "CVE-2022-49319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49319"
    },
    {
      "name": "CVE-2022-49320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49320"
    },
    {
      "name": "CVE-2022-49321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
    },
    {
      "name": "CVE-2022-49322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
    },
    {
      "name": "CVE-2022-49323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
    },
    {
      "name": "CVE-2022-49326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49326"
    },
    {
      "name": "CVE-2022-49327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49327"
    },
    {
      "name": "CVE-2022-49328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49328"
    },
    {
      "name": "CVE-2022-49331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49331"
    },
    {
      "name": "CVE-2022-49332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49332"
    },
    {
      "name": "CVE-2022-49335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49335"
    },
    {
      "name": "CVE-2022-49336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49336"
    },
    {
      "name": "CVE-2022-49337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49337"
    },
    {
      "name": "CVE-2022-49339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
    },
    {
      "name": "CVE-2022-49341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
    },
    {
      "name": "CVE-2022-49342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
    },
    {
      "name": "CVE-2022-49343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
    },
    {
      "name": "CVE-2022-49345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
    },
    {
      "name": "CVE-2022-49346",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49346"
    },
    {
      "name": "CVE-2022-49347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49347"
    },
    {
      "name": "CVE-2022-49348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49348"
    },
    {
      "name": "CVE-2022-49349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49349"
    },
    {
      "name": "CVE-2022-49350",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
    },
    {
      "name": "CVE-2022-49351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49351"
    },
    {
      "name": "CVE-2022-49352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
    },
    {
      "name": "CVE-2022-49354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49354"
    },
    {
      "name": "CVE-2022-49356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
    },
    {
      "name": "CVE-2022-49357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
    },
    {
      "name": "CVE-2022-49367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49367"
    },
    {
      "name": "CVE-2022-49368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49368"
    },
    {
      "name": "CVE-2022-49370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49370"
    },
    {
      "name": "CVE-2022-49371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49371"
    },
    {
      "name": "CVE-2022-49373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49373"
    },
    {
      "name": "CVE-2022-49375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49375"
    },
    {
      "name": "CVE-2022-49376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
    },
    {
      "name": "CVE-2022-49377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49377"
    },
    {
      "name": "CVE-2022-49378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
    },
    {
      "name": "CVE-2022-49379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
    },
    {
      "name": "CVE-2022-49381",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49381"
    },
    {
      "name": "CVE-2022-49382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49382"
    },
    {
      "name": "CVE-2022-49384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
    },
    {
      "name": "CVE-2022-49385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49385"
    },
    {
      "name": "CVE-2022-49386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49386"
    },
    {
      "name": "CVE-2022-49389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49389"
    },
    {
      "name": "CVE-2022-49392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49392"
    },
    {
      "name": "CVE-2022-49394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
    },
    {
      "name": "CVE-2022-49396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49396"
    },
    {
      "name": "CVE-2022-49397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49397"
    },
    {
      "name": "CVE-2022-49398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49398"
    },
    {
      "name": "CVE-2022-49399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49399"
    },
    {
      "name": "CVE-2022-49400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
    },
    {
      "name": "CVE-2022-49402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
    },
    {
      "name": "CVE-2022-49404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
    },
    {
      "name": "CVE-2022-49407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
    },
    {
      "name": "CVE-2022-49409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
    },
    {
      "name": "CVE-2022-49410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49410"
    },
    {
      "name": "CVE-2022-49411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49411"
    },
    {
      "name": "CVE-2022-49412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49412"
    },
    {
      "name": "CVE-2022-49413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49413"
    },
    {
      "name": "CVE-2022-49414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49414"
    },
    {
      "name": "CVE-2022-49416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49416"
    },
    {
      "name": "CVE-2022-49418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49418"
    },
    {
      "name": "CVE-2022-49421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49421"
    },
    {
      "name": "CVE-2022-49422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
    },
    {
      "name": "CVE-2022-49424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49424"
    },
    {
      "name": "CVE-2022-49426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49426"
    },
    {
      "name": "CVE-2022-49427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49427"
    },
    {
      "name": "CVE-2022-49429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49429"
    },
    {
      "name": "CVE-2022-49430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49430"
    },
    {
      "name": "CVE-2022-49431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49431"
    },
    {
      "name": "CVE-2022-49432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
    },
    {
      "name": "CVE-2022-49433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
    },
    {
      "name": "CVE-2022-49434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
    },
    {
      "name": "CVE-2022-49435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49435"
    },
    {
      "name": "CVE-2022-49437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49437"
    },
    {
      "name": "CVE-2022-49438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49438"
    },
    {
      "name": "CVE-2022-49440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49440"
    },
    {
      "name": "CVE-2022-49441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
    },
    {
      "name": "CVE-2022-49442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49442"
    },
    {
      "name": "CVE-2022-49443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49443"
    },
    {
      "name": "CVE-2022-49444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49444"
    },
    {
      "name": "CVE-2022-49445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49445"
    },
    {
      "name": "CVE-2022-49447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
    },
    {
      "name": "CVE-2022-49448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49448"
    },
    {
      "name": "CVE-2022-49449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49449"
    },
    {
      "name": "CVE-2022-49451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49451"
    },
    {
      "name": "CVE-2022-49453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49453"
    },
    {
      "name": "CVE-2022-49455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
    },
    {
      "name": "CVE-2022-49459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49459"
    },
    {
      "name": "CVE-2022-49460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49460"
    },
    {
      "name": "CVE-2022-49462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49462"
    },
    {
      "name": "CVE-2022-49463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49463"
    },
    {
      "name": "CVE-2022-49466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49466"
    },
    {
      "name": "CVE-2022-49467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49467"
    },
    {
      "name": "CVE-2022-49468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
    },
    {
      "name": "CVE-2022-49472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
    },
    {
      "name": "CVE-2022-49473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49473"
    },
    {
      "name": "CVE-2022-49474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49474"
    },
    {
      "name": "CVE-2022-49475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
    },
    {
      "name": "CVE-2022-49477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49477"
    },
    {
      "name": "CVE-2022-49478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49478"
    },
    {
      "name": "CVE-2022-49480",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49480"
    },
    {
      "name": "CVE-2022-49481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
    },
    {
      "name": "CVE-2022-49482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49482"
    },
    {
      "name": "CVE-2022-49486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
    },
    {
      "name": "CVE-2022-49487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49487"
    },
    {
      "name": "CVE-2022-49488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49488"
    },
    {
      "name": "CVE-2022-49489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49489"
    },
    {
      "name": "CVE-2022-49491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49491"
    },
    {
      "name": "CVE-2022-49492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
    },
    {
      "name": "CVE-2022-49493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49493"
    },
    {
      "name": "CVE-2022-49494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49494"
    },
    {
      "name": "CVE-2022-49495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49495"
    },
    {
      "name": "CVE-2022-49498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
    },
    {
      "name": "CVE-2022-49501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49501"
    },
    {
      "name": "CVE-2022-49502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49502"
    },
    {
      "name": "CVE-2022-49503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
    },
    {
      "name": "CVE-2022-49504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
    },
    {
      "name": "CVE-2022-49505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49505"
    },
    {
      "name": "CVE-2022-49506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49506"
    },
    {
      "name": "CVE-2022-49507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49507"
    },
    {
      "name": "CVE-2022-49508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
    },
    {
      "name": "CVE-2022-49509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49509"
    },
    {
      "name": "CVE-2022-49512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49512"
    },
    {
      "name": "CVE-2022-49514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49514"
    },
    {
      "name": "CVE-2022-49515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
    },
    {
      "name": "CVE-2022-49517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49517"
    },
    {
      "name": "CVE-2022-49519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
    },
    {
      "name": "CVE-2022-49520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
    },
    {
      "name": "CVE-2022-49521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
    },
    {
      "name": "CVE-2022-49522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49522"
    },
    {
      "name": "CVE-2022-49523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
    },
    {
      "name": "CVE-2022-49524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49524"
    },
    {
      "name": "CVE-2022-49525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49525"
    },
    {
      "name": "CVE-2022-49526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
    },
    {
      "name": "CVE-2022-49527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49527"
    },
    {
      "name": "CVE-2022-49532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
    },
    {
      "name": "CVE-2022-49534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2022-49536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49536"
    },
    {
      "name": "CVE-2022-49537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49537"
    },
    {
      "name": "CVE-2022-49541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49541"
    },
    {
      "name": "CVE-2022-49542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49542"
    },
    {
      "name": "CVE-2022-49544",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49544"
    },
    {
      "name": "CVE-2022-49545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
    },
    {
      "name": "CVE-2022-49546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49546"
    },
    {
      "name": "CVE-2022-49549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49549"
    },
    {
      "name": "CVE-2022-49551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49551"
    },
    {
      "name": "CVE-2022-49555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49555"
    },
    {
      "name": "CVE-2022-49556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49556"
    },
    {
      "name": "CVE-2022-49559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
    },
    {
      "name": "CVE-2022-49562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
    },
    {
      "name": "CVE-2022-49563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49563"
    },
    {
      "name": "CVE-2022-49564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49564"
    },
    {
      "name": "CVE-2022-49566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49566"
    },
    {
      "name": "CVE-2022-49568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49568"
    },
    {
      "name": "CVE-2022-49569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49569"
    },
    {
      "name": "CVE-2022-49570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49570"
    },
    {
      "name": "CVE-2022-49579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49579"
    },
    {
      "name": "CVE-2022-49581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
    },
    {
      "name": "CVE-2022-49583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
    },
    {
      "name": "CVE-2022-49584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
    },
    {
      "name": "CVE-2022-49591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49591"
    },
    {
      "name": "CVE-2022-49592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
    },
    {
      "name": "CVE-2022-49603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
    },
    {
      "name": "CVE-2022-49605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
    },
    {
      "name": "CVE-2022-49606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
    },
    {
      "name": "CVE-2022-49607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
    },
    {
      "name": "CVE-2022-49609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49609"
    },
    {
      "name": "CVE-2022-49610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49610"
    },
    {
      "name": "CVE-2022-49611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
    },
    {
      "name": "CVE-2022-49613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
    },
    {
      "name": "CVE-2022-49615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49615"
    },
    {
      "name": "CVE-2022-49616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49616"
    },
    {
      "name": "CVE-2022-49617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49617"
    },
    {
      "name": "CVE-2022-49618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49618"
    },
    {
      "name": "CVE-2022-49621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49621"
    },
    {
      "name": "CVE-2022-49623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49623"
    },
    {
      "name": "CVE-2022-49625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
    },
    {
      "name": "CVE-2022-49627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
    },
    {
      "name": "CVE-2022-49628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49628"
    },
    {
      "name": "CVE-2022-49631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
    },
    {
      "name": "CVE-2022-49634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
    },
    {
      "name": "CVE-2022-49640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
    },
    {
      "name": "CVE-2022-49641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
    },
    {
      "name": "CVE-2022-49642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
    },
    {
      "name": "CVE-2022-49643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
    },
    {
      "name": "CVE-2022-49644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49644"
    },
    {
      "name": "CVE-2022-49645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49645"
    },
    {
      "name": "CVE-2022-49646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
    },
    {
      "name": "CVE-2022-49647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49647"
    },
    {
      "name": "CVE-2022-49648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
    },
    {
      "name": "CVE-2022-49649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49649"
    },
    {
      "name": "CVE-2022-49652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49652"
    },
    {
      "name": "CVE-2022-49653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
    },
    {
      "name": "CVE-2022-49656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
    },
    {
      "name": "CVE-2022-49657",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
    },
    {
      "name": "CVE-2022-49663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
    },
    {
      "name": "CVE-2022-49665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49665"
    },
    {
      "name": "CVE-2022-49667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49667"
    },
    {
      "name": "CVE-2022-49668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49668"
    },
    {
      "name": "CVE-2022-49670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
    },
    {
      "name": "CVE-2022-49671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
    },
    {
      "name": "CVE-2022-49672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
    },
    {
      "name": "CVE-2022-49673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
    },
    {
      "name": "CVE-2022-49674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
    },
    {
      "name": "CVE-2022-49675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
    },
    {
      "name": "CVE-2022-49676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49676"
    },
    {
      "name": "CVE-2022-49677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49677"
    },
    {
      "name": "CVE-2022-49678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49678"
    },
    {
      "name": "CVE-2022-49679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
    },
    {
      "name": "CVE-2022-49680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49680"
    },
    {
      "name": "CVE-2022-49683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49683"
    },
    {
      "name": "CVE-2022-49685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49685"
    },
    {
      "name": "CVE-2022-49687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49687"
    },
    {
      "name": "CVE-2022-49688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
    },
    {
      "name": "CVE-2022-49693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49693"
    },
    {
      "name": "CVE-2022-49695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49695"
    },
    {
      "name": "CVE-2022-49699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
    },
    {
      "name": "CVE-2022-49700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49700"
    },
    {
      "name": "CVE-2022-49701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49701"
    },
    {
      "name": "CVE-2022-49703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49703"
    },
    {
      "name": "CVE-2022-49704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49704"
    },
    {
      "name": "CVE-2022-49705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49705"
    },
    {
      "name": "CVE-2022-49707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
    },
    {
      "name": "CVE-2022-49708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
    },
    {
      "name": "CVE-2022-49710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
    },
    {
      "name": "CVE-2022-49711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49711"
    },
    {
      "name": "CVE-2022-49712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49712"
    },
    {
      "name": "CVE-2022-49713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49713"
    },
    {
      "name": "CVE-2022-49714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49714"
    },
    {
      "name": "CVE-2022-49715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49715"
    },
    {
      "name": "CVE-2022-49716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
    },
    {
      "name": "CVE-2022-49719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49719"
    },
    {
      "name": "CVE-2022-49720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49720"
    },
    {
      "name": "CVE-2022-49721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
    },
    {
      "name": "CVE-2022-49722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
    },
    {
      "name": "CVE-2022-49723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
    },
    {
      "name": "CVE-2022-49724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49724"
    },
    {
      "name": "CVE-2022-49725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49725"
    },
    {
      "name": "CVE-2022-49726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
    },
    {
      "name": "CVE-2022-49729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49729"
    },
    {
      "name": "CVE-2022-49730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49730"
    },
    {
      "name": "CVE-2022-49731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
    },
    {
      "name": "CVE-2022-49733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49733"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2024-58014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
    },
    {
      "name": "CVE-2025-21718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-47794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
    },
    {
      "name": "CVE-2024-54683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
    },
    {
      "name": "CVE-2024-56638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
    },
    {
      "name": "CVE-2024-56719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
    },
    {
      "name": "CVE-2024-56758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56758"
    },
    {
      "name": "CVE-2025-21635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
    },
    {
      "name": "CVE-2025-21659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2024-57973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
    },
    {
      "name": "CVE-2024-57978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57978"
    },
    {
      "name": "CVE-2024-57980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
    },
    {
      "name": "CVE-2024-57981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
    },
    {
      "name": "CVE-2024-57986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
    },
    {
      "name": "CVE-2024-57993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
    },
    {
      "name": "CVE-2024-57997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
    },
    {
      "name": "CVE-2024-58007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
    },
    {
      "name": "CVE-2024-58009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
    },
    {
      "name": "CVE-2024-58011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
    },
    {
      "name": "CVE-2024-58013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
    },
    {
      "name": "CVE-2024-58017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2024-58034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
    },
    {
      "name": "CVE-2024-58051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
    },
    {
      "name": "CVE-2024-58052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
    },
    {
      "name": "CVE-2024-58054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
    },
    {
      "name": "CVE-2024-58055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
    },
    {
      "name": "CVE-2024-58056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
    },
    {
      "name": "CVE-2024-58058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
    },
    {
      "name": "CVE-2024-58061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
    },
    {
      "name": "CVE-2024-58063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
    },
    {
      "name": "CVE-2024-58069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
    },
    {
      "name": "CVE-2024-58072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
    },
    {
      "name": "CVE-2024-58076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
    },
    {
      "name": "CVE-2024-58080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2024-58085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-21701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
    },
    {
      "name": "CVE-2025-21703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21703"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-21708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
    },
    {
      "name": "CVE-2025-21711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
    },
    {
      "name": "CVE-2025-21726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
    },
    {
      "name": "CVE-2025-21727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
    },
    {
      "name": "CVE-2025-21731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
    },
    {
      "name": "CVE-2025-21734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
    },
    {
      "name": "CVE-2025-21735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
    },
    {
      "name": "CVE-2025-21736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
    },
    {
      "name": "CVE-2025-21738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
    },
    {
      "name": "CVE-2025-21744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
    },
    {
      "name": "CVE-2025-21750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21794"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
    },
    {
      "name": "CVE-2025-21819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
    },
    {
      "name": "CVE-2025-21820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
    },
    {
      "name": "CVE-2025-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
    },
    {
      "name": "CVE-2025-21832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2021-4454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4454"
    },
    {
      "name": "CVE-2022-49053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49053"
    },
    {
      "name": "CVE-2022-49056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49056"
    },
    {
      "name": "CVE-2022-49057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
    },
    {
      "name": "CVE-2022-49062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
    },
    {
      "name": "CVE-2022-49064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
    },
    {
      "name": "CVE-2022-49070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
    },
    {
      "name": "CVE-2022-49071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49071"
    },
    {
      "name": "CVE-2022-49075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49075"
    },
    {
      "name": "CVE-2022-49123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
    },
    {
      "name": "CVE-2022-49125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
    },
    {
      "name": "CVE-2022-49133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
    },
    {
      "name": "CVE-2022-49136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
    },
    {
      "name": "CVE-2022-49138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
    },
    {
      "name": "CVE-2022-49139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
    },
    {
      "name": "CVE-2022-49144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49144"
    },
    {
      "name": "CVE-2022-49183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49183"
    },
    {
      "name": "CVE-2022-49192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49192"
    },
    {
      "name": "CVE-2022-49202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49202"
    },
    {
      "name": "CVE-2022-49203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
    },
    {
      "name": "CVE-2022-49204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
    },
    {
      "name": "CVE-2022-49205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
    },
    {
      "name": "CVE-2022-49207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
    },
    {
      "name": "CVE-2022-49209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
    },
    {
      "name": "CVE-2022-49215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49215"
    },
    {
      "name": "CVE-2022-49219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49219"
    },
    {
      "name": "CVE-2022-49225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
    },
    {
      "name": "CVE-2022-49228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
    },
    {
      "name": "CVE-2022-49230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49230"
    },
    {
      "name": "CVE-2022-49233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49233"
    },
    {
      "name": "CVE-2022-49237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
    },
    {
      "name": "CVE-2022-49238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49238"
    },
    {
      "name": "CVE-2022-49293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49293"
    },
    {
      "name": "CVE-2022-49296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
    },
    {
      "name": "CVE-2022-49306",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
    },
    {
      "name": "CVE-2022-49325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49325"
    },
    {
      "name": "CVE-2022-49329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49329"
    },
    {
      "name": "CVE-2022-49330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
    },
    {
      "name": "CVE-2022-49333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
    },
    {
      "name": "CVE-2022-49338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49338"
    },
    {
      "name": "CVE-2022-49353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
    },
    {
      "name": "CVE-2022-49359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
    },
    {
      "name": "CVE-2022-49362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49362"
    },
    {
      "name": "CVE-2022-49365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49365"
    },
    {
      "name": "CVE-2022-49390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49390"
    },
    {
      "name": "CVE-2022-49406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
    },
    {
      "name": "CVE-2022-49419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49419"
    },
    {
      "name": "CVE-2022-49436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
    },
    {
      "name": "CVE-2022-49446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
    },
    {
      "name": "CVE-2022-49458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49458"
    },
    {
      "name": "CVE-2022-49465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
    },
    {
      "name": "CVE-2022-49470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49470"
    },
    {
      "name": "CVE-2022-49476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
    },
    {
      "name": "CVE-2022-49479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49479"
    },
    {
      "name": "CVE-2022-49483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49483"
    },
    {
      "name": "CVE-2022-49484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
    },
    {
      "name": "CVE-2022-49485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49485"
    },
    {
      "name": "CVE-2022-49497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49497"
    },
    {
      "name": "CVE-2022-49499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49499"
    },
    {
      "name": "CVE-2022-49510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49510"
    },
    {
      "name": "CVE-2022-49511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
    },
    {
      "name": "CVE-2022-49516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
    },
    {
      "name": "CVE-2022-49518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
    },
    {
      "name": "CVE-2022-49529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
    },
    {
      "name": "CVE-2022-49530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49530"
    },
    {
      "name": "CVE-2022-49533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
    },
    {
      "name": "CVE-2022-49538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
    },
    {
      "name": "CVE-2022-49543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
    },
    {
      "name": "CVE-2022-49548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
    },
    {
      "name": "CVE-2022-49552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
    },
    {
      "name": "CVE-2022-49560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
    },
    {
      "name": "CVE-2022-49565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
    },
    {
      "name": "CVE-2022-49624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
    },
    {
      "name": "CVE-2022-49635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
    },
    {
      "name": "CVE-2022-49638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
    },
    {
      "name": "CVE-2022-49650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49650"
    },
    {
      "name": "CVE-2022-49655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
    },
    {
      "name": "CVE-2022-49658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
    },
    {
      "name": "CVE-2022-49686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49686"
    },
    {
      "name": "CVE-2022-49694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49694"
    },
    {
      "name": "CVE-2022-49697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
    },
    {
      "name": "CVE-2022-49732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
    },
    {
      "name": "CVE-2022-49739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
    },
    {
      "name": "CVE-2022-49746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
    },
    {
      "name": "CVE-2022-49748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49748"
    },
    {
      "name": "CVE-2022-49751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49751"
    },
    {
      "name": "CVE-2022-49753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49753"
    },
    {
      "name": "CVE-2022-49755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49755"
    },
    {
      "name": "CVE-2022-49759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
    },
    {
      "name": "CVE-2023-52831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2023-52930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52930"
    },
    {
      "name": "CVE-2023-52933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
    },
    {
      "name": "CVE-2023-52935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52935"
    },
    {
      "name": "CVE-2023-52939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
    },
    {
      "name": "CVE-2023-52941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
    },
    {
      "name": "CVE-2023-52973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52973"
    },
    {
      "name": "CVE-2023-52974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52974"
    },
    {
      "name": "CVE-2023-52975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52975"
    },
    {
      "name": "CVE-2023-52976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
    },
    {
      "name": "CVE-2023-52979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52979"
    },
    {
      "name": "CVE-2023-52983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52983"
    },
    {
      "name": "CVE-2023-52984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
    },
    {
      "name": "CVE-2023-52988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52988"
    },
    {
      "name": "CVE-2023-52989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52989"
    },
    {
      "name": "CVE-2023-52992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
    },
    {
      "name": "CVE-2023-52993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
    },
    {
      "name": "CVE-2023-53000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53000"
    },
    {
      "name": "CVE-2023-53005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53005"
    },
    {
      "name": "CVE-2023-53006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
    },
    {
      "name": "CVE-2023-53007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
    },
    {
      "name": "CVE-2023-53008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
    },
    {
      "name": "CVE-2023-53010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
    },
    {
      "name": "CVE-2023-53015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
    },
    {
      "name": "CVE-2023-53016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
    },
    {
      "name": "CVE-2023-53019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
    },
    {
      "name": "CVE-2023-53023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53023"
    },
    {
      "name": "CVE-2023-53024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53024"
    },
    {
      "name": "CVE-2023-53025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53025"
    },
    {
      "name": "CVE-2023-53026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
    },
    {
      "name": "CVE-2023-53028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53028"
    },
    {
      "name": "CVE-2023-53029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
    },
    {
      "name": "CVE-2023-53030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
    },
    {
      "name": "CVE-2023-53033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
    },
    {
      "name": "CVE-2024-41149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41149"
    },
    {
      "name": "CVE-2024-46736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
    },
    {
      "name": "CVE-2024-46796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2024-57947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57947"
    },
    {
      "name": "CVE-2024-57974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
    },
    {
      "name": "CVE-2024-57990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
    },
    {
      "name": "CVE-2024-57999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
    },
    {
      "name": "CVE-2024-58002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2024-58006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
    },
    {
      "name": "CVE-2024-58012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
    },
    {
      "name": "CVE-2024-58019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
    },
    {
      "name": "CVE-2024-58057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
    },
    {
      "name": "CVE-2024-58078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
    },
    {
      "name": "CVE-2024-58079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
    },
    {
      "name": "CVE-2025-21693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
    },
    {
      "name": "CVE-2025-21714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
    },
    {
      "name": "CVE-2025-21723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
    },
    {
      "name": "CVE-2025-21732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
    },
    {
      "name": "CVE-2025-21739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
    },
    {
      "name": "CVE-2025-21741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
    },
    {
      "name": "CVE-2025-21742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
    },
    {
      "name": "CVE-2025-21743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
    },
    {
      "name": "CVE-2025-21756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2025-21773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
    },
    {
      "name": "CVE-2025-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
    },
    {
      "name": "CVE-2025-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
    },
    {
      "name": "CVE-2025-21810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
    },
    {
      "name": "CVE-2025-21815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
    },
    {
      "name": "CVE-2025-21825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
    },
    {
      "name": "CVE-2025-21828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
    },
    {
      "name": "CVE-2025-21831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-21850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21850"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
    },
    {
      "name": "CVE-2025-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
    },
    {
      "name": "CVE-2025-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
    },
    {
      "name": "CVE-2025-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
    },
    {
      "name": "CVE-2025-21885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
    },
    {
      "name": "CVE-2025-21886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
    },
    {
      "name": "CVE-2025-21888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
    },
    {
      "name": "CVE-2025-21890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
    },
    {
      "name": "CVE-2025-21891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
    },
    {
      "name": "CVE-2025-21892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
    }
  ],
  "initial_release_date": "2025-04-11T00:00:00",
  "last_revision_date": "2025-04-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0307",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1177-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251177-1"
    },
    {
      "published_at": "2025-04-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1180-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251180-1"
    },
    {
      "published_at": "2025-04-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1194-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251194-1"
    },
    {
      "published_at": "2025-04-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1195-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251195-1"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1178-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1176-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251176-1"
    },
    {
      "published_at": "2025-04-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1183-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251183-1"
    }
  ]
}
  CERTFR-2025-AVI-0509
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | Confidential Computing Module | Confidential Computing Module 15-SP6 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Confidential Computing Module 15-SP6",
      "product": {
        "name": "Confidential Computing Module",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.5",
      "product": {
        "name": "openSUSE Leap",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.3",
      "product": {
        "name": "openSUSE Leap",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.4",
      "product": {
        "name": "openSUSE Leap",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP6",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.2",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.1",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.4",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.6",
      "product": {
        "name": "openSUSE Leap",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.3",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP5",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.3",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP6",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP4",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP3",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.5",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP6",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro 6.0",
      "product": {
        "name": "SUSE Linux Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.4",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
    },
    {
      "name": "CVE-2022-3619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
    },
    {
      "name": "CVE-2022-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
    },
    {
      "name": "CVE-2023-1990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
    },
    {
      "name": "CVE-2024-27018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27018"
    },
    {
      "name": "CVE-2024-26634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26634"
    },
    {
      "name": "CVE-2024-35910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
    },
    {
      "name": "CVE-2024-26873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26873"
    },
    {
      "name": "CVE-2024-27415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27415"
    },
    {
      "name": "CVE-2024-35826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
    },
    {
      "name": "CVE-2024-41005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
    },
    {
      "name": "CVE-2024-38606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
    },
    {
      "name": "CVE-2024-41077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
    },
    {
      "name": "CVE-2024-46713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
    },
    {
      "name": "CVE-2024-46763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
    },
    {
      "name": "CVE-2024-46782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
    },
    {
      "name": "CVE-2024-46865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
    },
    {
      "name": "CVE-2024-43869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
    },
    {
      "name": "CVE-2024-49855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
    },
    {
      "name": "CVE-2024-50036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50036"
    },
    {
      "name": "CVE-2024-50126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
    },
    {
      "name": "CVE-2024-50290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
    },
    {
      "name": "CVE-2024-53057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
    },
    {
      "name": "CVE-2024-53063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
    },
    {
      "name": "CVE-2024-42307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307"
    },
    {
      "name": "CVE-2024-43820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
    },
    {
      "name": "CVE-2024-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
    },
    {
      "name": "CVE-2024-50038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
    },
    {
      "name": "CVE-2024-50083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
    },
    {
      "name": "CVE-2024-50162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
    },
    {
      "name": "CVE-2024-50163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
    },
    {
      "name": "CVE-2024-53135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
    },
    {
      "name": "CVE-2024-53140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
    },
    {
      "name": "CVE-2024-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
    },
    {
      "name": "CVE-2024-53168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53168"
    },
    {
      "name": "CVE-2024-56558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
    },
    {
      "name": "CVE-2024-56641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
    },
    {
      "name": "CVE-2024-49994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
    },
    {
      "name": "CVE-2024-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
    },
    {
      "name": "CVE-2024-56703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
    },
    {
      "name": "CVE-2025-21631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21631"
    },
    {
      "name": "CVE-2025-21648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21648"
    },
    {
      "name": "CVE-2025-21671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
    },
    {
      "name": "CVE-2025-21680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
    },
    {
      "name": "CVE-2025-21683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
    },
    {
      "name": "CVE-2024-53177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
    },
    {
      "name": "CVE-2024-49940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
    },
    {
      "name": "CVE-2024-50029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
    },
    {
      "name": "CVE-2024-50056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
    },
    {
      "name": "CVE-2024-50140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50140"
    },
    {
      "name": "CVE-2024-50152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
    },
    {
      "name": "CVE-2024-50223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
    },
    {
      "name": "CVE-2024-50294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
    },
    {
      "name": "CVE-2024-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53139"
    },
    {
      "name": "CVE-2024-53163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53163"
    },
    {
      "name": "CVE-2024-53176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
    },
    {
      "name": "CVE-2024-53178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
    },
    {
      "name": "CVE-2024-56702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2023-52926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
    },
    {
      "name": "CVE-2024-47408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47408"
    },
    {
      "name": "CVE-2024-49571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49571"
    },
    {
      "name": "CVE-2024-53680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
    },
    {
      "name": "CVE-2024-56640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
    },
    {
      "name": "CVE-2024-56718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
    },
    {
      "name": "CVE-2024-56770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
    },
    {
      "name": "CVE-2024-57807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57807"
    },
    {
      "name": "CVE-2024-57900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57900"
    },
    {
      "name": "CVE-2022-49080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
    },
    {
      "name": "CVE-2024-57979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
    },
    {
      "name": "CVE-2024-57994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
    },
    {
      "name": "CVE-2025-21705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
    },
    {
      "name": "CVE-2025-21715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
    },
    {
      "name": "CVE-2025-21716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
    },
    {
      "name": "CVE-2025-21719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
    },
    {
      "name": "CVE-2025-21724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
    },
    {
      "name": "CVE-2025-21725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2025-21754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
    },
    {
      "name": "CVE-2025-21802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
    },
    {
      "name": "CVE-2022-49563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49563"
    },
    {
      "name": "CVE-2022-49564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49564"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2024-58014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
    },
    {
      "name": "CVE-2025-21718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-47794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
    },
    {
      "name": "CVE-2024-54683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
    },
    {
      "name": "CVE-2024-56638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
    },
    {
      "name": "CVE-2024-56719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
    },
    {
      "name": "CVE-2024-56758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56758"
    },
    {
      "name": "CVE-2024-57924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
    },
    {
      "name": "CVE-2025-21635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
    },
    {
      "name": "CVE-2025-21659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2024-57973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
    },
    {
      "name": "CVE-2024-57978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57978"
    },
    {
      "name": "CVE-2024-57980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
    },
    {
      "name": "CVE-2024-57981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
    },
    {
      "name": "CVE-2024-57986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
    },
    {
      "name": "CVE-2024-57993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
    },
    {
      "name": "CVE-2024-57997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2024-58007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
    },
    {
      "name": "CVE-2024-58009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
    },
    {
      "name": "CVE-2024-58011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
    },
    {
      "name": "CVE-2024-58013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
    },
    {
      "name": "CVE-2024-58017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2024-58034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
    },
    {
      "name": "CVE-2024-58051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
    },
    {
      "name": "CVE-2024-58052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
    },
    {
      "name": "CVE-2024-58054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
    },
    {
      "name": "CVE-2024-58055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
    },
    {
      "name": "CVE-2024-58056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
    },
    {
      "name": "CVE-2024-58058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
    },
    {
      "name": "CVE-2024-58061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
    },
    {
      "name": "CVE-2024-58063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-58069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-58072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
    },
    {
      "name": "CVE-2024-58076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
    },
    {
      "name": "CVE-2024-58080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2024-58085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-21701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
    },
    {
      "name": "CVE-2025-21703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21703"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
    },
    {
      "name": "CVE-2025-21711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
    },
    {
      "name": "CVE-2025-21726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
    },
    {
      "name": "CVE-2025-21727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
    },
    {
      "name": "CVE-2025-21731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
    },
    {
      "name": "CVE-2025-21734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
    },
    {
      "name": "CVE-2025-21735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
    },
    {
      "name": "CVE-2025-21736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
    },
    {
      "name": "CVE-2025-21738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
    },
    {
      "name": "CVE-2025-21744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
    },
    {
      "name": "CVE-2025-21750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-21794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21794"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2025-21814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
    },
    {
      "name": "CVE-2025-21819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
    },
    {
      "name": "CVE-2025-21820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
    },
    {
      "name": "CVE-2025-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
    },
    {
      "name": "CVE-2025-21832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2022-49139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
    },
    {
      "name": "CVE-2023-52831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2024-41149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41149"
    },
    {
      "name": "CVE-2024-46736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
    },
    {
      "name": "CVE-2024-46796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2024-57947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57947"
    },
    {
      "name": "CVE-2024-57974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
    },
    {
      "name": "CVE-2024-57990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
    },
    {
      "name": "CVE-2024-57999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
    },
    {
      "name": "CVE-2024-58002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2024-58006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
    },
    {
      "name": "CVE-2024-58012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
    },
    {
      "name": "CVE-2024-58019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
    },
    {
      "name": "CVE-2024-58057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
    },
    {
      "name": "CVE-2024-58078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
    },
    {
      "name": "CVE-2024-58079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
    },
    {
      "name": "CVE-2025-21693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
    },
    {
      "name": "CVE-2025-21714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
    },
    {
      "name": "CVE-2025-21723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
    },
    {
      "name": "CVE-2025-21732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
    },
    {
      "name": "CVE-2025-21739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
    },
    {
      "name": "CVE-2025-21741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
    },
    {
      "name": "CVE-2025-21742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
    },
    {
      "name": "CVE-2025-21743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
    },
    {
      "name": "CVE-2025-21756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2025-21773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
    },
    {
      "name": "CVE-2025-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
    },
    {
      "name": "CVE-2025-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
    },
    {
      "name": "CVE-2025-21810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
    },
    {
      "name": "CVE-2025-21815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
    },
    {
      "name": "CVE-2025-21825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
    },
    {
      "name": "CVE-2025-21828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
    },
    {
      "name": "CVE-2025-21831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-21850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21850"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
    },
    {
      "name": "CVE-2025-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
    },
    {
      "name": "CVE-2025-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
    },
    {
      "name": "CVE-2025-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
    },
    {
      "name": "CVE-2025-21885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
    },
    {
      "name": "CVE-2025-21886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
    },
    {
      "name": "CVE-2025-21888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
    },
    {
      "name": "CVE-2025-21890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
    },
    {
      "name": "CVE-2025-21891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
    },
    {
      "name": "CVE-2025-21892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
    },
    {
      "name": "CVE-2025-21702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
    },
    {
      "name": "CVE-2025-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
    },
    {
      "name": "CVE-2025-21909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
    },
    {
      "name": "CVE-2025-21910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
    },
    {
      "name": "CVE-2025-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
    },
    {
      "name": "CVE-2025-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
    },
    {
      "name": "CVE-2025-21914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
    },
    {
      "name": "CVE-2025-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
    },
    {
      "name": "CVE-2025-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
    },
    {
      "name": "CVE-2025-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
    },
    {
      "name": "CVE-2025-21919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
    },
    {
      "name": "CVE-2025-21922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
    },
    {
      "name": "CVE-2025-21924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
    },
    {
      "name": "CVE-2025-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
    },
    {
      "name": "CVE-2025-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
    },
    {
      "name": "CVE-2025-21936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
    },
    {
      "name": "CVE-2025-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
    },
    {
      "name": "CVE-2025-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
    },
    {
      "name": "CVE-2025-21950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
    },
    {
      "name": "CVE-2025-21951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
    },
    {
      "name": "CVE-2025-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
    },
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2025-21969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
    },
    {
      "name": "CVE-2025-21696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-21927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
    },
    {
      "name": "CVE-2025-22093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-22126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2024-28956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
    },
    {
      "name": "CVE-2025-21953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
    },
    {
      "name": "CVE-2022-49110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49110"
    },
    {
      "name": "CVE-2022-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49767"
    },
    {
      "name": "CVE-2023-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53051"
    },
    {
      "name": "CVE-2024-35840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35840"
    },
    {
      "name": "CVE-2024-58018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
    },
    {
      "name": "CVE-2024-58070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2024-58094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
    },
    {
      "name": "CVE-2024-58095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
    },
    {
      "name": "CVE-2024-58096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
    },
    {
      "name": "CVE-2024-58097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
    },
    {
      "name": "CVE-2025-21729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21729"
    },
    {
      "name": "CVE-2025-21755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
    },
    {
      "name": "CVE-2025-21833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21852"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
    },
    {
      "name": "CVE-2025-21884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
    },
    {
      "name": "CVE-2025-21889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
    },
    {
      "name": "CVE-2025-21894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
    },
    {
      "name": "CVE-2025-21895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
    },
    {
      "name": "CVE-2025-21906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
    },
    {
      "name": "CVE-2025-21908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
    },
    {
      "name": "CVE-2025-21915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
    },
    {
      "name": "CVE-2025-21923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21923"
    },
    {
      "name": "CVE-2025-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
    },
    {
      "name": "CVE-2025-21931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
    },
    {
      "name": "CVE-2025-21961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
    },
    {
      "name": "CVE-2025-21966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
    },
    {
      "name": "CVE-2025-21972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
    },
    {
      "name": "CVE-2025-21985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
    },
    {
      "name": "CVE-2025-21995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
    },
    {
      "name": "CVE-2025-22001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
    },
    {
      "name": "CVE-2025-22003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
    },
    {
      "name": "CVE-2025-22009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
    },
    {
      "name": "CVE-2025-22013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
    },
    {
      "name": "CVE-2025-22016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
    },
    {
      "name": "CVE-2025-22017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22029"
    },
    {
      "name": "CVE-2025-22036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22036"
    },
    {
      "name": "CVE-2025-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-22064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22064"
    },
    {
      "name": "CVE-2025-22065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22065"
    },
    {
      "name": "CVE-2025-22080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22080"
    },
    {
      "name": "CVE-2025-22090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
    },
    {
      "name": "CVE-2025-22102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
    },
    {
      "name": "CVE-2025-22104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
    },
    {
      "name": "CVE-2025-22105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
    },
    {
      "name": "CVE-2025-22106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
    },
    {
      "name": "CVE-2025-22107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
    },
    {
      "name": "CVE-2025-22108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22108"
    },
    {
      "name": "CVE-2025-22109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
    },
    {
      "name": "CVE-2025-22115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
    },
    {
      "name": "CVE-2025-22116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
    },
    {
      "name": "CVE-2025-22121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
    },
    {
      "name": "CVE-2025-22128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
    },
    {
      "name": "CVE-2025-23129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
    },
    {
      "name": "CVE-2025-23131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
    },
    {
      "name": "CVE-2025-23133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2025-37860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-37748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
    },
    {
      "name": "CVE-2025-37948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
    },
    {
      "name": "CVE-2022-49769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49769"
    },
    {
      "name": "CVE-2022-49770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49770"
    },
    {
      "name": "CVE-2022-49771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49771"
    },
    {
      "name": "CVE-2022-49772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49772"
    },
    {
      "name": "CVE-2022-49775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49775"
    },
    {
      "name": "CVE-2022-49776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49776"
    },
    {
      "name": "CVE-2022-49777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49777"
    },
    {
      "name": "CVE-2022-49779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49779"
    },
    {
      "name": "CVE-2022-49783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
    },
    {
      "name": "CVE-2022-49787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49787"
    },
    {
      "name": "CVE-2022-49788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49788"
    },
    {
      "name": "CVE-2022-49789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49789"
    },
    {
      "name": "CVE-2022-49790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49790"
    },
    {
      "name": "CVE-2022-49792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49792"
    },
    {
      "name": "CVE-2022-49793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49793"
    },
    {
      "name": "CVE-2022-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49794"
    },
    {
      "name": "CVE-2022-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49796"
    },
    {
      "name": "CVE-2022-49797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49797"
    },
    {
      "name": "CVE-2022-49799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49799"
    },
    {
      "name": "CVE-2022-49800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49800"
    },
    {
      "name": "CVE-2022-49801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49801"
    },
    {
      "name": "CVE-2022-49802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49802"
    },
    {
      "name": "CVE-2022-49807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49807"
    },
    {
      "name": "CVE-2022-49809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49809"
    },
    {
      "name": "CVE-2022-49810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
    },
    {
      "name": "CVE-2022-49812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49812"
    },
    {
      "name": "CVE-2022-49813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49813"
    },
    {
      "name": "CVE-2022-49818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49818"
    },
    {
      "name": "CVE-2022-49821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49821"
    },
    {
      "name": "CVE-2022-49822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49822"
    },
    {
      "name": "CVE-2022-49823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49823"
    },
    {
      "name": "CVE-2022-49824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49824"
    },
    {
      "name": "CVE-2022-49825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49825"
    },
    {
      "name": "CVE-2022-49826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49826"
    },
    {
      "name": "CVE-2022-49827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49827"
    },
    {
      "name": "CVE-2022-49830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49830"
    },
    {
      "name": "CVE-2022-49832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49832"
    },
    {
      "name": "CVE-2022-49834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49834"
    },
    {
      "name": "CVE-2022-49835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49835"
    },
    {
      "name": "CVE-2022-49836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49836"
    },
    {
      "name": "CVE-2022-49839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49839"
    },
    {
      "name": "CVE-2022-49841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49841"
    },
    {
      "name": "CVE-2022-49842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49842"
    },
    {
      "name": "CVE-2022-49845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49845"
    },
    {
      "name": "CVE-2022-49846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
    },
    {
      "name": "CVE-2022-49850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49850"
    },
    {
      "name": "CVE-2022-49853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49853"
    },
    {
      "name": "CVE-2022-49858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
    },
    {
      "name": "CVE-2022-49860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49860"
    },
    {
      "name": "CVE-2022-49861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49861"
    },
    {
      "name": "CVE-2022-49863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49863"
    },
    {
      "name": "CVE-2022-49864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49864"
    },
    {
      "name": "CVE-2022-49865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49865"
    },
    {
      "name": "CVE-2022-49868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49868"
    },
    {
      "name": "CVE-2022-49869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49869"
    },
    {
      "name": "CVE-2022-49870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49870"
    },
    {
      "name": "CVE-2022-49871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49871"
    },
    {
      "name": "CVE-2022-49874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49874"
    },
    {
      "name": "CVE-2022-49879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49879"
    },
    {
      "name": "CVE-2022-49880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49880"
    },
    {
      "name": "CVE-2022-49881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49881"
    },
    {
      "name": "CVE-2022-49885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49885"
    },
    {
      "name": "CVE-2022-49887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49887"
    },
    {
      "name": "CVE-2022-49888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49888"
    },
    {
      "name": "CVE-2022-49889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49889"
    },
    {
      "name": "CVE-2022-49890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49890"
    },
    {
      "name": "CVE-2022-49891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49891"
    },
    {
      "name": "CVE-2022-49892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49892"
    },
    {
      "name": "CVE-2022-49900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49900"
    },
    {
      "name": "CVE-2022-49905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49905"
    },
    {
      "name": "CVE-2022-49906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49906"
    },
    {
      "name": "CVE-2022-49908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49908"
    },
    {
      "name": "CVE-2022-49909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49909"
    },
    {
      "name": "CVE-2022-49910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
    },
    {
      "name": "CVE-2022-49915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49915"
    },
    {
      "name": "CVE-2022-49916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49916"
    },
    {
      "name": "CVE-2022-49922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49922"
    },
    {
      "name": "CVE-2022-49923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49923"
    },
    {
      "name": "CVE-2022-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49924"
    },
    {
      "name": "CVE-2022-49925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49925"
    },
    {
      "name": "CVE-2022-49927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49927"
    },
    {
      "name": "CVE-2022-49928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49928"
    },
    {
      "name": "CVE-2022-49931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49931"
    },
    {
      "name": "CVE-2023-53035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53035"
    },
    {
      "name": "CVE-2023-53038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53038"
    },
    {
      "name": "CVE-2023-53039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53039"
    },
    {
      "name": "CVE-2023-53040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53040"
    },
    {
      "name": "CVE-2023-53041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53041"
    },
    {
      "name": "CVE-2023-53044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53044"
    },
    {
      "name": "CVE-2023-53045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53045"
    },
    {
      "name": "CVE-2023-53049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53049"
    },
    {
      "name": "CVE-2023-53052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
    },
    {
      "name": "CVE-2023-53054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53054"
    },
    {
      "name": "CVE-2023-53056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53056"
    },
    {
      "name": "CVE-2023-53058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53058"
    },
    {
      "name": "CVE-2023-53059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53059"
    },
    {
      "name": "CVE-2023-53060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53060"
    },
    {
      "name": "CVE-2023-53062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53062"
    },
    {
      "name": "CVE-2023-53064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53064"
    },
    {
      "name": "CVE-2023-53065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53065"
    },
    {
      "name": "CVE-2023-53066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53066"
    },
    {
      "name": "CVE-2023-53068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
    },
    {
      "name": "CVE-2023-53075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53075"
    },
    {
      "name": "CVE-2023-53077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53077"
    },
    {
      "name": "CVE-2023-53078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53078"
    },
    {
      "name": "CVE-2023-53079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53079"
    },
    {
      "name": "CVE-2023-53081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53081"
    },
    {
      "name": "CVE-2023-53084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53084"
    },
    {
      "name": "CVE-2023-53087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53087"
    },
    {
      "name": "CVE-2023-53089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53089"
    },
    {
      "name": "CVE-2023-53090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53090"
    },
    {
      "name": "CVE-2023-53091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53091"
    },
    {
      "name": "CVE-2023-53092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53092"
    },
    {
      "name": "CVE-2023-53093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
    },
    {
      "name": "CVE-2023-53096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53096"
    },
    {
      "name": "CVE-2023-53098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53098"
    },
    {
      "name": "CVE-2023-53099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53099"
    },
    {
      "name": "CVE-2023-53100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53100"
    },
    {
      "name": "CVE-2023-53101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53101"
    },
    {
      "name": "CVE-2023-53106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53106"
    },
    {
      "name": "CVE-2023-53108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53108"
    },
    {
      "name": "CVE-2023-53111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53111"
    },
    {
      "name": "CVE-2023-53114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53114"
    },
    {
      "name": "CVE-2023-53116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53116"
    },
    {
      "name": "CVE-2023-53118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53118"
    },
    {
      "name": "CVE-2023-53119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53119"
    },
    {
      "name": "CVE-2023-53123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53123"
    },
    {
      "name": "CVE-2023-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53124"
    },
    {
      "name": "CVE-2023-53125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53125"
    },
    {
      "name": "CVE-2023-53131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53131"
    },
    {
      "name": "CVE-2023-53134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53134"
    },
    {
      "name": "CVE-2023-53137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53137"
    },
    {
      "name": "CVE-2023-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53139"
    },
    {
      "name": "CVE-2023-53140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53140"
    },
    {
      "name": "CVE-2023-53142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53142"
    },
    {
      "name": "CVE-2023-53143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53143"
    },
    {
      "name": "CVE-2023-53145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53145"
    },
    {
      "name": "CVE-2025-22030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22030"
    },
    {
      "name": "CVE-2025-22057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
    },
    {
      "name": "CVE-2025-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22070"
    },
    {
      "name": "CVE-2025-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
    },
    {
      "name": "CVE-2025-22125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
    },
    {
      "name": "CVE-2025-23160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
    },
    {
      "name": "CVE-2025-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
    },
    {
      "name": "CVE-2025-37755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
    },
    {
      "name": "CVE-2025-37804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37804"
    },
    {
      "name": "CVE-2025-37809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
    },
    {
      "name": "CVE-2025-37831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
    },
    {
      "name": "CVE-2025-37833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
    },
    {
      "name": "CVE-2025-37842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
    },
    {
      "name": "CVE-2025-37870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
    },
    {
      "name": "CVE-2025-37886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
    },
    {
      "name": "CVE-2025-37887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
    },
    {
      "name": "CVE-2025-37957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
    },
    {
      "name": "CVE-2025-37958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
    },
    {
      "name": "CVE-2025-37960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
    },
    {
      "name": "CVE-2025-37974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
    },
    {
      "name": "CVE-2025-40325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
    }
  ],
  "initial_release_date": "2025-06-13T00:00:00",
  "last_revision_date": "2025-06-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0509",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01901-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501901-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01894-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501894-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01892-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501892-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20387-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520387-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01873-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501873-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01930-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501930-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01932-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501932-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20388-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520388-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01927-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501927-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01908-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501908-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01918-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501918-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01928-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501928-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01843-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501843-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01875-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501875-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01922-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501922-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20382-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520382-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01853-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501853-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01851-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501851-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01929-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501929-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20389-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520389-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01899-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501899-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01840-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501840-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01849-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501849-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01893-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501893-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20383-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520383-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20384-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520384-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20381-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520381-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01844-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501844-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01919-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501919-1"
    },
    {
      "published_at": "2025-06-09",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01839-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501839-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01935-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501935-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01869-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501869-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01868-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501868-1"
    },
    {
      "published_at": "2025-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01907-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501907-1"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20386-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520386-1"
    },
    {
      "published_at": "2025-06-12",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01906-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501906-1"
    }
  ]
}
  CERTFR-2025-AVI-0529
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Manager Proxy 4.2 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
| SUSE | N/A | SUSE Linux Micro 6.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Micro 6.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | Public Cloud Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Manager Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Manager Proxy 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro Extras 6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Desktop 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Public Cloud Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Basesystem Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro 6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro for Rancher 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Real Time Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Micro 6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Legacy Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Public Cloud Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Desktop 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Legacy Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Retail Branch Server 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Enterprise Storage 7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time 15 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Development Tools Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Server 4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP3 LTSS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap 15.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Basesystem Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "Development Tools Module 15-SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 15 SP6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Real Time Module 15-SP7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro 5.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    },
    {
      "name": "CVE-2021-3743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
    },
    {
      "name": "CVE-2021-20320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20320"
    },
    {
      "name": "CVE-2022-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
    },
    {
      "name": "CVE-2022-3619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
    },
    {
      "name": "CVE-2022-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
    },
    {
      "name": "CVE-2021-4159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4159"
    },
    {
      "name": "CVE-2023-1074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
    },
    {
      "name": "CVE-2023-28866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28866"
    },
    {
      "name": "CVE-2023-1989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
    },
    {
      "name": "CVE-2023-1990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
    },
    {
      "name": "CVE-2023-6531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6531"
    },
    {
      "name": "CVE-2023-0160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
    },
    {
      "name": "CVE-2023-47233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47233"
    },
    {
      "name": "CVE-2023-52591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
    },
    {
      "name": "CVE-2021-47100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47100"
    },
    {
      "name": "CVE-2023-52508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
    },
    {
      "name": "CVE-2024-26804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
    },
    {
      "name": "CVE-2021-47170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47170"
    },
    {
      "name": "CVE-2024-27018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27018"
    },
    {
      "name": "CVE-2022-48704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
    },
    {
      "name": "CVE-2021-47220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47220"
    },
    {
      "name": "CVE-2021-47229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47229"
    },
    {
      "name": "CVE-2021-47231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47231"
    },
    {
      "name": "CVE-2021-47236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
    },
    {
      "name": "CVE-2021-47239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
    },
    {
      "name": "CVE-2021-47240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47240"
    },
    {
      "name": "CVE-2021-47246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47246"
    },
    {
      "name": "CVE-2021-47252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47252"
    },
    {
      "name": "CVE-2021-47255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47255"
    },
    {
      "name": "CVE-2021-47260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47260"
    },
    {
      "name": "CVE-2021-47288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47288"
    },
    {
      "name": "CVE-2021-47296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47296"
    },
    {
      "name": "CVE-2021-47314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47314"
    },
    {
      "name": "CVE-2021-47315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47315"
    },
    {
      "name": "CVE-2021-47485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47485"
    },
    {
      "name": "CVE-2021-47500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
    },
    {
      "name": "CVE-2021-47511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47511"
    },
    {
      "name": "CVE-2023-52654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
    },
    {
      "name": "CVE-2023-52868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
    },
    {
      "name": "CVE-2024-35811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35811"
    },
    {
      "name": "CVE-2024-35895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35895"
    },
    {
      "name": "CVE-2024-35914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35914"
    },
    {
      "name": "CVE-2024-26740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
    },
    {
      "name": "CVE-2024-35910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
    },
    {
      "name": "CVE-2024-27415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27415"
    },
    {
      "name": "CVE-2024-27010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
    },
    {
      "name": "CVE-2024-41005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
    },
    {
      "name": "CVE-2024-38606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
    },
    {
      "name": "CVE-2022-48875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
    },
    {
      "name": "CVE-2024-45021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
    },
    {
      "name": "CVE-2024-46713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
    },
    {
      "name": "CVE-2024-46752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
    },
    {
      "name": "CVE-2024-46763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
    },
    {
      "name": "CVE-2024-46782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
    },
    {
      "name": "CVE-2024-46814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
    },
    {
      "name": "CVE-2024-46865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2023-52888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
    },
    {
      "name": "CVE-2024-43869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
    },
    {
      "name": "CVE-2024-50126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
    },
    {
      "name": "CVE-2024-50290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
    },
    {
      "name": "CVE-2024-53057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
    },
    {
      "name": "CVE-2024-53063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
    },
    {
      "name": "CVE-2024-43820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
    },
    {
      "name": "CVE-2024-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
    },
    {
      "name": "CVE-2024-50038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
    },
    {
      "name": "CVE-2024-50083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
    },
    {
      "name": "CVE-2024-50162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
    },
    {
      "name": "CVE-2024-50163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
    },
    {
      "name": "CVE-2024-53135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
    },
    {
      "name": "CVE-2024-53140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
    },
    {
      "name": "CVE-2024-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
    },
    {
      "name": "CVE-2024-53168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53168"
    },
    {
      "name": "CVE-2024-56558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
    },
    {
      "name": "CVE-2024-56641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
    },
    {
      "name": "CVE-2024-56705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56705"
    },
    {
      "name": "CVE-2024-56779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56779"
    },
    {
      "name": "CVE-2024-49994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
    },
    {
      "name": "CVE-2024-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
    },
    {
      "name": "CVE-2024-56703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
    },
    {
      "name": "CVE-2025-21648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21648"
    },
    {
      "name": "CVE-2025-21680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
    },
    {
      "name": "CVE-2025-21683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
    },
    {
      "name": "CVE-2024-56633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56633"
    },
    {
      "name": "CVE-2024-50056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
    },
    {
      "name": "CVE-2024-50140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50140"
    },
    {
      "name": "CVE-2024-50223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
    },
    {
      "name": "CVE-2024-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53139"
    },
    {
      "name": "CVE-2024-53163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53163"
    },
    {
      "name": "CVE-2024-56702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2024-47408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47408"
    },
    {
      "name": "CVE-2024-49571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49571"
    },
    {
      "name": "CVE-2024-53680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
    },
    {
      "name": "CVE-2024-56640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
    },
    {
      "name": "CVE-2024-56718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
    },
    {
      "name": "CVE-2024-56770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
    },
    {
      "name": "CVE-2024-57900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57900"
    },
    {
      "name": "CVE-2025-21629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
    },
    {
      "name": "CVE-2022-49080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2022-49145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
    },
    {
      "name": "CVE-2022-49212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49212"
    },
    {
      "name": "CVE-2022-49216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
    },
    {
      "name": "CVE-2022-49235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49235"
    },
    {
      "name": "CVE-2022-49248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49248"
    },
    {
      "name": "CVE-2022-49253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49253"
    },
    {
      "name": "CVE-2022-49320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49320"
    },
    {
      "name": "CVE-2022-49326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49326"
    },
    {
      "name": "CVE-2022-49371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49371"
    },
    {
      "name": "CVE-2022-49382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49382"
    },
    {
      "name": "CVE-2022-49396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49396"
    },
    {
      "name": "CVE-2022-49441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
    },
    {
      "name": "CVE-2022-49445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49445"
    },
    {
      "name": "CVE-2022-49460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49460"
    },
    {
      "name": "CVE-2022-49467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49467"
    },
    {
      "name": "CVE-2022-49474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49474"
    },
    {
      "name": "CVE-2022-49491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49491"
    },
    {
      "name": "CVE-2022-49503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
    },
    {
      "name": "CVE-2022-49563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49563"
    },
    {
      "name": "CVE-2022-49564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49564"
    },
    {
      "name": "CVE-2022-49592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
    },
    {
      "name": "CVE-2022-49625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
    },
    {
      "name": "CVE-2022-49652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49652"
    },
    {
      "name": "CVE-2022-49715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49715"
    },
    {
      "name": "CVE-2022-49729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49729"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2024-47794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
    },
    {
      "name": "CVE-2024-49568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
    },
    {
      "name": "CVE-2024-54683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
    },
    {
      "name": "CVE-2024-56638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
    },
    {
      "name": "CVE-2024-56719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
    },
    {
      "name": "CVE-2024-56758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56758"
    },
    {
      "name": "CVE-2024-57924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
    },
    {
      "name": "CVE-2025-21635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
    },
    {
      "name": "CVE-2025-21659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2024-58013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2025-21701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
    },
    {
      "name": "CVE-2025-21703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21703"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2025-21814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-21832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
    },
    {
      "name": "CVE-2022-49139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
    },
    {
      "name": "CVE-2022-49635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
    },
    {
      "name": "CVE-2022-49751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49751"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2023-52975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52975"
    },
    {
      "name": "CVE-2023-52988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52988"
    },
    {
      "name": "CVE-2023-52989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52989"
    },
    {
      "name": "CVE-2023-52993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
    },
    {
      "name": "CVE-2024-57947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57947"
    },
    {
      "name": "CVE-2024-57974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
    },
    {
      "name": "CVE-2024-58019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
    },
    {
      "name": "CVE-2025-21693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
    },
    {
      "name": "CVE-2025-21739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-21850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21850"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
    },
    {
      "name": "CVE-2025-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
    },
    {
      "name": "CVE-2025-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
    },
    {
      "name": "CVE-2025-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
    },
    {
      "name": "CVE-2025-21885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
    },
    {
      "name": "CVE-2025-21886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
    },
    {
      "name": "CVE-2025-21888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
    },
    {
      "name": "CVE-2025-21890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
    },
    {
      "name": "CVE-2025-21891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
    },
    {
      "name": "CVE-2025-21892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
    },
    {
      "name": "CVE-2025-21702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
    },
    {
      "name": "CVE-2025-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
    },
    {
      "name": "CVE-2025-21909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
    },
    {
      "name": "CVE-2025-21910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
    },
    {
      "name": "CVE-2025-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
    },
    {
      "name": "CVE-2025-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
    },
    {
      "name": "CVE-2025-21914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
    },
    {
      "name": "CVE-2025-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
    },
    {
      "name": "CVE-2025-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
    },
    {
      "name": "CVE-2025-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
    },
    {
      "name": "CVE-2025-21919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
    },
    {
      "name": "CVE-2025-21922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
    },
    {
      "name": "CVE-2025-21924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
    },
    {
      "name": "CVE-2025-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
    },
    {
      "name": "CVE-2025-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
    },
    {
      "name": "CVE-2025-21936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
    },
    {
      "name": "CVE-2025-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
    },
    {
      "name": "CVE-2025-21938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
    },
    {
      "name": "CVE-2025-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
    },
    {
      "name": "CVE-2025-21950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
    },
    {
      "name": "CVE-2025-21951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
    },
    {
      "name": "CVE-2025-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
    },
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2025-21969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
    },
    {
      "name": "CVE-2025-21696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-21927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
    },
    {
      "name": "CVE-2025-22089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
    },
    {
      "name": "CVE-2025-22093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
    },
    {
      "name": "CVE-2025-22095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22095"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-22126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2024-28956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
    },
    {
      "name": "CVE-2025-21953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
    },
    {
      "name": "CVE-2021-47670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47670"
    },
    {
      "name": "CVE-2022-49110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49110"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2022-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49767"
    },
    {
      "name": "CVE-2023-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53051"
    },
    {
      "name": "CVE-2024-35840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35840"
    },
    {
      "name": "CVE-2024-58018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
    },
    {
      "name": "CVE-2024-58070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2024-58094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
    },
    {
      "name": "CVE-2024-58095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
    },
    {
      "name": "CVE-2024-58096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
    },
    {
      "name": "CVE-2024-58097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
    },
    {
      "name": "CVE-2025-21729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21729"
    },
    {
      "name": "CVE-2025-21755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
    },
    {
      "name": "CVE-2025-21833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21852"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
    },
    {
      "name": "CVE-2025-21884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
    },
    {
      "name": "CVE-2025-21889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
    },
    {
      "name": "CVE-2025-21894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
    },
    {
      "name": "CVE-2025-21895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
    },
    {
      "name": "CVE-2025-21906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
    },
    {
      "name": "CVE-2025-21908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
    },
    {
      "name": "CVE-2025-21915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
    },
    {
      "name": "CVE-2025-21923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21923"
    },
    {
      "name": "CVE-2025-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
    },
    {
      "name": "CVE-2025-21931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
    },
    {
      "name": "CVE-2025-21961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
    },
    {
      "name": "CVE-2025-21966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
    },
    {
      "name": "CVE-2025-21972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
    },
    {
      "name": "CVE-2025-21985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
    },
    {
      "name": "CVE-2025-21995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
    },
    {
      "name": "CVE-2025-22001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
    },
    {
      "name": "CVE-2025-22003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
    },
    {
      "name": "CVE-2025-22009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
    },
    {
      "name": "CVE-2025-22013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
    },
    {
      "name": "CVE-2025-22016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
    },
    {
      "name": "CVE-2025-22017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22029"
    },
    {
      "name": "CVE-2025-22036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22036"
    },
    {
      "name": "CVE-2025-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-22064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22064"
    },
    {
      "name": "CVE-2025-22065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22065"
    },
    {
      "name": "CVE-2025-22080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22080"
    },
    {
      "name": "CVE-2025-22090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
    },
    {
      "name": "CVE-2025-22102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
    },
    {
      "name": "CVE-2025-22104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
    },
    {
      "name": "CVE-2025-22105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
    },
    {
      "name": "CVE-2025-22106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
    },
    {
      "name": "CVE-2025-22107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
    },
    {
      "name": "CVE-2025-22108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22108"
    },
    {
      "name": "CVE-2025-22109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
    },
    {
      "name": "CVE-2025-22115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
    },
    {
      "name": "CVE-2025-22116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
    },
    {
      "name": "CVE-2025-22121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
    },
    {
      "name": "CVE-2025-22128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
    },
    {
      "name": "CVE-2025-23129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
    },
    {
      "name": "CVE-2025-23131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
    },
    {
      "name": "CVE-2025-23133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2025-37860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2022-49190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49190"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
    },
    {
      "name": "CVE-2025-37752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37782"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
    },
    {
      "name": "CVE-2025-37820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
    },
    {
      "name": "CVE-2025-37854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
    },
    {
      "name": "CVE-2025-37979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
    },
    {
      "name": "CVE-2025-37901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
    },
    {
      "name": "CVE-2025-37903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-37917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
    },
    {
      "name": "CVE-2025-37928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
    },
    {
      "name": "CVE-2025-37929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37929"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
    },
    {
      "name": "CVE-2025-37948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
    },
    {
      "name": "CVE-2025-37953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37953"
    },
    {
      "name": "CVE-2025-37959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
    },
    {
      "name": "CVE-2025-37963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2022-49769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49769"
    },
    {
      "name": "CVE-2022-49770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49770"
    },
    {
      "name": "CVE-2022-49771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49771"
    },
    {
      "name": "CVE-2022-49772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49772"
    },
    {
      "name": "CVE-2022-49775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49775"
    },
    {
      "name": "CVE-2022-49776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49776"
    },
    {
      "name": "CVE-2022-49777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49777"
    },
    {
      "name": "CVE-2022-49779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49779"
    },
    {
      "name": "CVE-2022-49783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
    },
    {
      "name": "CVE-2022-49787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49787"
    },
    {
      "name": "CVE-2022-49788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49788"
    },
    {
      "name": "CVE-2022-49789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49789"
    },
    {
      "name": "CVE-2022-49790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49790"
    },
    {
      "name": "CVE-2022-49792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49792"
    },
    {
      "name": "CVE-2022-49793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49793"
    },
    {
      "name": "CVE-2022-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49794"
    },
    {
      "name": "CVE-2022-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49796"
    },
    {
      "name": "CVE-2022-49797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49797"
    },
    {
      "name": "CVE-2022-49799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49799"
    },
    {
      "name": "CVE-2022-49800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49800"
    },
    {
      "name": "CVE-2022-49801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49801"
    },
    {
      "name": "CVE-2022-49802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49802"
    },
    {
      "name": "CVE-2022-49807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49807"
    },
    {
      "name": "CVE-2022-49809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49809"
    },
    {
      "name": "CVE-2022-49810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
    },
    {
      "name": "CVE-2022-49812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49812"
    },
    {
      "name": "CVE-2022-49813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49813"
    },
    {
      "name": "CVE-2022-49818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49818"
    },
    {
      "name": "CVE-2022-49821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49821"
    },
    {
      "name": "CVE-2022-49822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49822"
    },
    {
      "name": "CVE-2022-49823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49823"
    },
    {
      "name": "CVE-2022-49824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49824"
    },
    {
      "name": "CVE-2022-49825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49825"
    },
    {
      "name": "CVE-2022-49826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49826"
    },
    {
      "name": "CVE-2022-49827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49827"
    },
    {
      "name": "CVE-2022-49830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49830"
    },
    {
      "name": "CVE-2022-49832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49832"
    },
    {
      "name": "CVE-2022-49834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49834"
    },
    {
      "name": "CVE-2022-49835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49835"
    },
    {
      "name": "CVE-2022-49836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49836"
    },
    {
      "name": "CVE-2022-49839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49839"
    },
    {
      "name": "CVE-2022-49841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49841"
    },
    {
      "name": "CVE-2022-49842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49842"
    },
    {
      "name": "CVE-2022-49845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49845"
    },
    {
      "name": "CVE-2022-49846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
    },
    {
      "name": "CVE-2022-49850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49850"
    },
    {
      "name": "CVE-2022-49853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49853"
    },
    {
      "name": "CVE-2022-49858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
    },
    {
      "name": "CVE-2022-49860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49860"
    },
    {
      "name": "CVE-2022-49861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49861"
    },
    {
      "name": "CVE-2022-49863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49863"
    },
    {
      "name": "CVE-2022-49864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49864"
    },
    {
      "name": "CVE-2022-49865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49865"
    },
    {
      "name": "CVE-2022-49868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49868"
    },
    {
      "name": "CVE-2022-49869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49869"
    },
    {
      "name": "CVE-2022-49870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49870"
    },
    {
      "name": "CVE-2022-49871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49871"
    },
    {
      "name": "CVE-2022-49874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49874"
    },
    {
      "name": "CVE-2022-49879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49879"
    },
    {
      "name": "CVE-2022-49880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49880"
    },
    {
      "name": "CVE-2022-49881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49881"
    },
    {
      "name": "CVE-2022-49885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49885"
    },
    {
      "name": "CVE-2022-49887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49887"
    },
    {
      "name": "CVE-2022-49888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49888"
    },
    {
      "name": "CVE-2022-49889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49889"
    },
    {
      "name": "CVE-2022-49890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49890"
    },
    {
      "name": "CVE-2022-49891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49891"
    },
    {
      "name": "CVE-2022-49892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49892"
    },
    {
      "name": "CVE-2022-49900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49900"
    },
    {
      "name": "CVE-2022-49905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49905"
    },
    {
      "name": "CVE-2022-49906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49906"
    },
    {
      "name": "CVE-2022-49908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49908"
    },
    {
      "name": "CVE-2022-49909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49909"
    },
    {
      "name": "CVE-2022-49910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
    },
    {
      "name": "CVE-2022-49915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49915"
    },
    {
      "name": "CVE-2022-49916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49916"
    },
    {
      "name": "CVE-2022-49922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49922"
    },
    {
      "name": "CVE-2022-49923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49923"
    },
    {
      "name": "CVE-2022-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49924"
    },
    {
      "name": "CVE-2022-49925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49925"
    },
    {
      "name": "CVE-2022-49927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49927"
    },
    {
      "name": "CVE-2022-49928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49928"
    },
    {
      "name": "CVE-2022-49931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49931"
    },
    {
      "name": "CVE-2023-53035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53035"
    },
    {
      "name": "CVE-2023-53038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53038"
    },
    {
      "name": "CVE-2023-53039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53039"
    },
    {
      "name": "CVE-2023-53040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53040"
    },
    {
      "name": "CVE-2023-53041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53041"
    },
    {
      "name": "CVE-2023-53044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53044"
    },
    {
      "name": "CVE-2023-53045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53045"
    },
    {
      "name": "CVE-2023-53049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53049"
    },
    {
      "name": "CVE-2023-53052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
    },
    {
      "name": "CVE-2023-53054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53054"
    },
    {
      "name": "CVE-2023-53056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53056"
    },
    {
      "name": "CVE-2023-53058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53058"
    },
    {
      "name": "CVE-2023-53059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53059"
    },
    {
      "name": "CVE-2023-53060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53060"
    },
    {
      "name": "CVE-2023-53062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53062"
    },
    {
      "name": "CVE-2023-53064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53064"
    },
    {
      "name": "CVE-2023-53065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53065"
    },
    {
      "name": "CVE-2023-53066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53066"
    },
    {
      "name": "CVE-2023-53068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
    },
    {
      "name": "CVE-2023-53075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53075"
    },
    {
      "name": "CVE-2023-53077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53077"
    },
    {
      "name": "CVE-2023-53078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53078"
    },
    {
      "name": "CVE-2023-53079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53079"
    },
    {
      "name": "CVE-2023-53081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53081"
    },
    {
      "name": "CVE-2023-53084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53084"
    },
    {
      "name": "CVE-2023-53087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53087"
    },
    {
      "name": "CVE-2023-53089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53089"
    },
    {
      "name": "CVE-2023-53090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53090"
    },
    {
      "name": "CVE-2023-53091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53091"
    },
    {
      "name": "CVE-2023-53092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53092"
    },
    {
      "name": "CVE-2023-53093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
    },
    {
      "name": "CVE-2023-53096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53096"
    },
    {
      "name": "CVE-2023-53098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53098"
    },
    {
      "name": "CVE-2023-53099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53099"
    },
    {
      "name": "CVE-2023-53100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53100"
    },
    {
      "name": "CVE-2023-53101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53101"
    },
    {
      "name": "CVE-2023-53106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53106"
    },
    {
      "name": "CVE-2023-53108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53108"
    },
    {
      "name": "CVE-2023-53111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53111"
    },
    {
      "name": "CVE-2023-53114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53114"
    },
    {
      "name": "CVE-2023-53116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53116"
    },
    {
      "name": "CVE-2023-53118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53118"
    },
    {
      "name": "CVE-2023-53119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53119"
    },
    {
      "name": "CVE-2023-53123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53123"
    },
    {
      "name": "CVE-2023-53124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53124"
    },
    {
      "name": "CVE-2023-53125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53125"
    },
    {
      "name": "CVE-2023-53131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53131"
    },
    {
      "name": "CVE-2023-53134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53134"
    },
    {
      "name": "CVE-2023-53137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53137"
    },
    {
      "name": "CVE-2023-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53139"
    },
    {
      "name": "CVE-2023-53140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53140"
    },
    {
      "name": "CVE-2023-53142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53142"
    },
    {
      "name": "CVE-2023-53143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53143"
    },
    {
      "name": "CVE-2023-53145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53145"
    },
    {
      "name": "CVE-2025-22030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22030"
    },
    {
      "name": "CVE-2025-22057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
    },
    {
      "name": "CVE-2025-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22070"
    },
    {
      "name": "CVE-2025-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
    },
    {
      "name": "CVE-2025-22125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
    },
    {
      "name": "CVE-2025-23160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
    },
    {
      "name": "CVE-2025-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
    },
    {
      "name": "CVE-2025-37755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
    },
    {
      "name": "CVE-2025-37804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37804"
    },
    {
      "name": "CVE-2025-37809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
    },
    {
      "name": "CVE-2025-37831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
    },
    {
      "name": "CVE-2025-37833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
    },
    {
      "name": "CVE-2025-37842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
    },
    {
      "name": "CVE-2025-37870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
    },
    {
      "name": "CVE-2025-37886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
    },
    {
      "name": "CVE-2025-37887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
    },
    {
      "name": "CVE-2025-37957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
    },
    {
      "name": "CVE-2025-37958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
    },
    {
      "name": "CVE-2025-37960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
    },
    {
      "name": "CVE-2025-37974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
    },
    {
      "name": "CVE-2025-40325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
    },
    {
      "name": "CVE-2025-37943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
    },
    {
      "name": "CVE-2020-36790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36790"
    },
    {
      "name": "CVE-2020-36791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36791"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2022-49420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
    },
    {
      "name": "CVE-2022-49761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49761"
    },
    {
      "name": "CVE-2022-49762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49762"
    },
    {
      "name": "CVE-2022-49763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49763"
    },
    {
      "name": "CVE-2022-49773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
    },
    {
      "name": "CVE-2022-49781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49781"
    },
    {
      "name": "CVE-2022-49784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49784"
    },
    {
      "name": "CVE-2022-49786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49786"
    },
    {
      "name": "CVE-2022-49795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49795"
    },
    {
      "name": "CVE-2022-49829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
    },
    {
      "name": "CVE-2022-49837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49837"
    },
    {
      "name": "CVE-2022-49840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49840"
    },
    {
      "name": "CVE-2022-49862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49862"
    },
    {
      "name": "CVE-2022-49872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49872"
    },
    {
      "name": "CVE-2022-49877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49877"
    },
    {
      "name": "CVE-2022-49886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49886"
    },
    {
      "name": "CVE-2022-49898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49898"
    },
    {
      "name": "CVE-2022-49901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
    },
    {
      "name": "CVE-2022-49902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49902"
    },
    {
      "name": "CVE-2022-49907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49907"
    },
    {
      "name": "CVE-2022-49913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49913"
    },
    {
      "name": "CVE-2022-49914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49914"
    },
    {
      "name": "CVE-2022-49917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49917"
    },
    {
      "name": "CVE-2022-49918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49918"
    },
    {
      "name": "CVE-2022-49921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49921"
    },
    {
      "name": "CVE-2022-49929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49929"
    },
    {
      "name": "CVE-2023-53036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
    },
    {
      "name": "CVE-2023-53042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
    },
    {
      "name": "CVE-2023-53057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53057"
    },
    {
      "name": "CVE-2023-53070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53070"
    },
    {
      "name": "CVE-2023-53071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53071"
    },
    {
      "name": "CVE-2023-53073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53073"
    },
    {
      "name": "CVE-2023-53074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53074"
    },
    {
      "name": "CVE-2023-53080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53080"
    },
    {
      "name": "CVE-2023-53082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53082"
    },
    {
      "name": "CVE-2023-53094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53094"
    },
    {
      "name": "CVE-2023-53095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53095"
    },
    {
      "name": "CVE-2023-53102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53102"
    },
    {
      "name": "CVE-2023-53103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53103"
    },
    {
      "name": "CVE-2023-53105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
    },
    {
      "name": "CVE-2023-53109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53109"
    },
    {
      "name": "CVE-2023-53112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53112"
    },
    {
      "name": "CVE-2023-53121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53121"
    },
    {
      "name": "CVE-2023-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53128"
    },
    {
      "name": "CVE-2023-53141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53141"
    },
    {
      "name": "CVE-2023-53146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53146"
    },
    {
      "name": "CVE-2024-49570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49570"
    },
    {
      "name": "CVE-2024-58074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
    },
    {
      "name": "CVE-2024-58091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58091"
    },
    {
      "name": "CVE-2024-58098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
    },
    {
      "name": "CVE-2024-58099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58099"
    },
    {
      "name": "CVE-2024-58100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
    },
    {
      "name": "CVE-2024-58237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
    },
    {
      "name": "CVE-2025-21717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21717"
    },
    {
      "name": "CVE-2025-21800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21800"
    },
    {
      "name": "CVE-2025-21837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21837"
    },
    {
      "name": "CVE-2025-21868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
    },
    {
      "name": "CVE-2025-21882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21882"
    },
    {
      "name": "CVE-2025-21893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21893"
    },
    {
      "name": "CVE-2025-21929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
    },
    {
      "name": "CVE-2025-21973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21973"
    },
    {
      "name": "CVE-2025-21974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
    },
    {
      "name": "CVE-2025-21989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21989"
    },
    {
      "name": "CVE-2025-21990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21990"
    },
    {
      "name": "CVE-2025-22028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
    },
    {
      "name": "CVE-2025-22085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22085"
    },
    {
      "name": "CVE-2025-22091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22091"
    },
    {
      "name": "CVE-2025-22094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22094"
    },
    {
      "name": "CVE-2025-22112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22112"
    },
    {
      "name": "CVE-2025-22113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
    },
    {
      "name": "CVE-2025-22117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22117"
    },
    {
      "name": "CVE-2025-22118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22118"
    },
    {
      "name": "CVE-2025-22119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22119"
    },
    {
      "name": "CVE-2025-22124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
    },
    {
      "name": "CVE-2025-23134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23134"
    },
    {
      "name": "CVE-2025-23149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
    },
    {
      "name": "CVE-2025-23154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23154"
    },
    {
      "name": "CVE-2025-23155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
    },
    {
      "name": "CVE-2025-37743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
    },
    {
      "name": "CVE-2025-37747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
    },
    {
      "name": "CVE-2025-37754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
    },
    {
      "name": "CVE-2025-37793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
    },
    {
      "name": "CVE-2025-37800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
    },
    {
      "name": "CVE-2025-37846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
    },
    {
      "name": "CVE-2025-37853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
    },
    {
      "name": "CVE-2025-37873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
    },
    {
      "name": "CVE-2025-37874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
    },
    {
      "name": "CVE-2025-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
    },
    {
      "name": "CVE-2025-37900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
    },
    {
      "name": "CVE-2025-37918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
    },
    {
      "name": "CVE-2025-37925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
    },
    {
      "name": "CVE-2025-37931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
    },
    {
      "name": "CVE-2025-37933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
    },
    {
      "name": "CVE-2025-37944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
    },
    {
      "name": "CVE-2025-37954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
    },
    {
      "name": "CVE-2025-37968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
    },
    {
      "name": "CVE-2025-37978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
    },
    {
      "name": "CVE-2025-37980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
    },
    {
      "name": "CVE-2025-37986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
    },
    {
      "name": "CVE-2025-37987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2025-38104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
    },
    {
      "name": "CVE-2025-38240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38240"
    },
    {
      "name": "CVE-2025-40014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40014"
    },
    {
      "name": "CVE-2025-40364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
    }
  ],
  "initial_release_date": "2025-06-20T00:00:00",
  "last_revision_date": "2025-06-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0529",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01951-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501951-1"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01995-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501995-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01964-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501964-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01948-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501948-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01958-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501958-1"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01982-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501982-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01944-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501944-1"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01972-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01950-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501950-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20413-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520413-1"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02000-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502000-1"
    },
    {
      "published_at": "2025-06-15",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20419-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520419-1"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01983-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501983-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20421-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520421-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01965-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501965-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01949-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501949-1"
    },
    {
      "published_at": "2025-06-15",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20408-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520408-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01957-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501957-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01967-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501967-1"
    },
    {
      "published_at": "2025-06-16",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01966-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1"
    },
    {
      "published_at": "2025-06-13",
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01956-1",
      "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501956-1"
    }
  ]
}
  CERTFR-2025-AVI-0758
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 16.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 20.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 24.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 14.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 22.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-52477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2024-27074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27074"
    },
    {
      "name": "CVE-2024-26739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
    },
    {
      "name": "CVE-2021-47345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47345"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2024-35867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
    },
    {
      "name": "CVE-2024-35943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2024-38540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2024-36908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
    },
    {
      "name": "CVE-2024-27402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
    },
    {
      "name": "CVE-2022-48893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2024-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2024-46816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
    },
    {
      "name": "CVE-2024-47685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
    },
    {
      "name": "CVE-2024-49960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2024-50272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2024-27407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
    },
    {
      "name": "CVE-2024-49989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
    },
    {
      "name": "CVE-2024-50125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2024-50202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
    },
    {
      "name": "CVE-2024-53130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53130"
    },
    {
      "name": "CVE-2024-53131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53131"
    },
    {
      "name": "CVE-2024-50051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50051"
    },
    {
      "name": "CVE-2024-50258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
    },
    {
      "name": "CVE-2024-53203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
    },
    {
      "name": "CVE-2024-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
    },
    {
      "name": "CVE-2024-49887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2024-57979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
    },
    {
      "name": "CVE-2024-57994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
    },
    {
      "name": "CVE-2025-21705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
    },
    {
      "name": "CVE-2025-21715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
    },
    {
      "name": "CVE-2025-21716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
    },
    {
      "name": "CVE-2025-21719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
    },
    {
      "name": "CVE-2025-21724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
    },
    {
      "name": "CVE-2025-21725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2025-21754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
    },
    {
      "name": "CVE-2025-21802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2024-58014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
    },
    {
      "name": "CVE-2025-21718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2024-57973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
    },
    {
      "name": "CVE-2024-57980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
    },
    {
      "name": "CVE-2024-57981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
    },
    {
      "name": "CVE-2024-57986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
    },
    {
      "name": "CVE-2024-57993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
    },
    {
      "name": "CVE-2024-57997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
    },
    {
      "name": "CVE-2024-57998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2024-58007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
    },
    {
      "name": "CVE-2024-58010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
    },
    {
      "name": "CVE-2024-58011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
    },
    {
      "name": "CVE-2024-58013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
    },
    {
      "name": "CVE-2024-58016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
    },
    {
      "name": "CVE-2024-58017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2024-58034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
    },
    {
      "name": "CVE-2024-58051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
    },
    {
      "name": "CVE-2024-58052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
    },
    {
      "name": "CVE-2024-58054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
    },
    {
      "name": "CVE-2024-58055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
    },
    {
      "name": "CVE-2024-58056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
    },
    {
      "name": "CVE-2024-58058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
    },
    {
      "name": "CVE-2024-58061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
    },
    {
      "name": "CVE-2024-58063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
    },
    {
      "name": "CVE-2024-58068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
    },
    {
      "name": "CVE-2024-58069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-58072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
    },
    {
      "name": "CVE-2024-58076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
    },
    {
      "name": "CVE-2024-58077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
    },
    {
      "name": "CVE-2024-58080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2024-58085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-21707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
    },
    {
      "name": "CVE-2025-21708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
    },
    {
      "name": "CVE-2025-21711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
    },
    {
      "name": "CVE-2025-21722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
    },
    {
      "name": "CVE-2025-21726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
    },
    {
      "name": "CVE-2025-21727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
    },
    {
      "name": "CVE-2025-21731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
    },
    {
      "name": "CVE-2025-21734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
    },
    {
      "name": "CVE-2025-21735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
    },
    {
      "name": "CVE-2025-21736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
    },
    {
      "name": "CVE-2025-21738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
    },
    {
      "name": "CVE-2025-21744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
    },
    {
      "name": "CVE-2025-21749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
    },
    {
      "name": "CVE-2025-21750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
    },
    {
      "name": "CVE-2025-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
    },
    {
      "name": "CVE-2025-21814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
    },
    {
      "name": "CVE-2025-21820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
    },
    {
      "name": "CVE-2025-21829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
    },
    {
      "name": "CVE-2025-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
    },
    {
      "name": "CVE-2025-21832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2024-57974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
    },
    {
      "name": "CVE-2024-57990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
    },
    {
      "name": "CVE-2024-57999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
    },
    {
      "name": "CVE-2024-58002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2024-58006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
    },
    {
      "name": "CVE-2024-58019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
    },
    {
      "name": "CVE-2024-58057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
    },
    {
      "name": "CVE-2024-58078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
    },
    {
      "name": "CVE-2024-58079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
    },
    {
      "name": "CVE-2025-21714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
    },
    {
      "name": "CVE-2025-21723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
    },
    {
      "name": "CVE-2025-21732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
    },
    {
      "name": "CVE-2025-21739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
    },
    {
      "name": "CVE-2025-21741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
    },
    {
      "name": "CVE-2025-21742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
    },
    {
      "name": "CVE-2025-21743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2025-21773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
    },
    {
      "name": "CVE-2025-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
    },
    {
      "name": "CVE-2025-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
    },
    {
      "name": "CVE-2025-21810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
    },
    {
      "name": "CVE-2025-21815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
    },
    {
      "name": "CVE-2025-21825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
    },
    {
      "name": "CVE-2025-21828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-21721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2024-46742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2024-58081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
    },
    {
      "name": "CVE-2024-58018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
    },
    {
      "name": "CVE-2024-58070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-37909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-37923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
    },
    {
      "name": "CVE-2025-37927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2025-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
    },
    {
      "name": "CVE-2025-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
    },
    {
      "name": "CVE-2025-37974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2025-21868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2024-57982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
    },
    {
      "name": "CVE-2024-58053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
    },
    {
      "name": "CVE-2025-21720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-38003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
    },
    {
      "name": "CVE-2025-38004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2025-38031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
    },
    {
      "name": "CVE-2025-38043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
    },
    {
      "name": "CVE-2025-38044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
    },
    {
      "name": "CVE-2025-38065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
    },
    {
      "name": "CVE-2025-38068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
    },
    {
      "name": "CVE-2025-38072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
    },
    {
      "name": "CVE-2025-38077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
    },
    {
      "name": "CVE-2025-38078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
    },
    {
      "name": "CVE-2025-38079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2022-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
    },
    {
      "name": "CVE-2025-38061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
    },
    {
      "name": "CVE-2025-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
    },
    {
      "name": "CVE-2024-57953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
    },
    {
      "name": "CVE-2024-57975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
    },
    {
      "name": "CVE-2024-57984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57984"
    },
    {
      "name": "CVE-2024-58003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
    },
    {
      "name": "CVE-2024-58082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
    },
    {
      "name": "CVE-2025-21710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
    },
    {
      "name": "CVE-2025-21798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
    },
    {
      "name": "CVE-2025-21801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
    },
    {
      "name": "CVE-2025-21809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
    },
    {
      "name": "CVE-2025-21816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-38052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
    },
    {
      "name": "CVE-2025-38034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
    },
    {
      "name": "CVE-2025-38035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
    },
    {
      "name": "CVE-2025-38037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
    },
    {
      "name": "CVE-2025-38048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
    },
    {
      "name": "CVE-2025-38051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
    },
    {
      "name": "CVE-2025-38058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
    },
    {
      "name": "CVE-2025-38066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
    },
    {
      "name": "CVE-2025-38075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
    },
    {
      "name": "CVE-2025-38174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
    },
    {
      "name": "CVE-2025-38350",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
    },
    {
      "name": "CVE-2024-54456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
    },
    {
      "name": "CVE-2025-21746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
    },
    {
      "name": "CVE-2025-21783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
    },
    {
      "name": "CVE-2025-21786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
    }
  ],
  "initial_release_date": "2025-09-05T00:00:00",
  "last_revision_date": "2025-09-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0758",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": "2025-09-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7726-4",
      "url": "https://ubuntu.com/security/notices/USN-7726-4"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7725-1",
      "url": "https://ubuntu.com/security/notices/USN-7725-1"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7726-2",
      "url": "https://ubuntu.com/security/notices/USN-7726-2"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7703-4",
      "url": "https://ubuntu.com/security/notices/USN-7703-4"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7726-3",
      "url": "https://ubuntu.com/security/notices/USN-7726-3"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7724-1",
      "url": "https://ubuntu.com/security/notices/USN-7724-1"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7727-2",
      "url": "https://ubuntu.com/security/notices/USN-7727-2"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7725-2",
      "url": "https://ubuntu.com/security/notices/USN-7725-2"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-5",
      "url": "https://ubuntu.com/security/notices/USN-7704-5"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7727-1",
      "url": "https://ubuntu.com/security/notices/USN-7727-1"
    },
    {
      "published_at": "2025-09-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7727-3",
      "url": "https://ubuntu.com/security/notices/USN-7727-3"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7726-1",
      "url": "https://ubuntu.com/security/notices/USN-7726-1"
    },
    {
      "published_at": "2025-09-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7712-2",
      "url": "https://ubuntu.com/security/notices/USN-7712-2"
    },
    {
      "published_at": "2025-09-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7725-3",
      "url": "https://ubuntu.com/security/notices/USN-7725-3"
    },
    {
      "published_at": "2025-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7737-1",
      "url": "https://ubuntu.com/security/notices/USN-7737-1"
    }
  ]
}
  CERTFR-2025-AVI-0492
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC432 (6GK5432-0GR00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC432 (6GK5432-0GR00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC332 (6GK5332-0GA00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SIMATIC | SIMATIC S7-1500 versions supérieures ou égales àV3.1.5 pour les vulnérabilités CVE-2021-41617, CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5363, CVE-2023-6246, CVE-2023-6779, CVE-2023-6780, CVE-2023-28531, CVE-2023-38545, CVE-2023-38546, CVE-2023-44487, CVE-2023-46218, CVE-2023-46219, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2023-52927, CVE-2024-2961, CVE-2024-6119, CVE-2024-6387, CVE-2024-12133, CVE-2024-12243, CVE-2024-24855, CVE-2024-26596, CVE-2024-28085, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-37370, CVE-2024-37371, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50246, CVE-2024-53166, CVE-2024-57977, CVE-2024-57996, CVE-2024-58005, CVE-2025-4373, CVE-2025-4598, CVE-2025-21701, CVE-2025-21702, CVE-2025-21712, CVE-2025-21724, CVE-2025-21728, CVE-2025-21745, CVE-2025-21756, CVE-2025-21758, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21795, CVE-2025-21796, CVE-2025-21848, CVE-2025-21862, CVE-2025-21864, CVE-2025-21865, CVE-2025-26465, CVE-2025-31115 et CVE-2025-46836. | ||
| Siemens | SCALANCE | SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions antérieures à V3.1 | ||
| Siemens | SCALANCE | SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions antérieures à V3.2 | ||
| Siemens | SCALANCE | SCALANCE XC332 (6GK5332-0GA00-2AC2) versions antérieures à V3.2 | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC432 (6GK5432-0GR00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC432 (6GK5432-0GR00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC332 (6GK5332-0GA00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 versions sup\u00e9rieures ou \u00e9gales \u00e0V3.1.5 pour les vuln\u00e9rabilit\u00e9s CVE-2021-41617, CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5363, CVE-2023-6246, CVE-2023-6779, CVE-2023-6780, CVE-2023-28531, CVE-2023-38545, CVE-2023-38546, CVE-2023-44487, CVE-2023-46218, CVE-2023-46219, CVE-2023-48795, CVE-2023-51384, CVE-2023-51385, CVE-2023-52927, CVE-2024-2961, CVE-2024-6119, CVE-2024-6387, CVE-2024-12133, CVE-2024-12243, CVE-2024-24855, CVE-2024-26596, CVE-2024-28085, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34397, CVE-2024-37370, CVE-2024-37371, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-50246, CVE-2024-53166, CVE-2024-57977, CVE-2024-57996, CVE-2024-58005, CVE-2025-4373, CVE-2025-4598, CVE-2025-21701, CVE-2025-21702, CVE-2025-21712, CVE-2025-21724, CVE-2025-21728, CVE-2025-21745, CVE-2025-21756, CVE-2025-21758, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21795, CVE-2025-21796, CVE-2025-21848, CVE-2025-21862, CVE-2025-21864, CVE-2025-21865, CVE-2025-26465, CVE-2025-31115 et CVE-2025-46836.",
      "product": {
        "name": "SIMATIC",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC332 (6GK5332-0GA00-2AC2) versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "SCALANCE",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
    },
    {
      "name": "CVE-2024-41797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41797"
    },
    {
      "name": "CVE-2025-26465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
    },
    {
      "name": "CVE-2025-31115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-28531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28531"
    },
    {
      "name": "CVE-2023-6780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
    },
    {
      "name": "CVE-2023-51385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2025-40568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40568"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2024-45492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
    },
    {
      "name": "CVE-2024-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
    },
    {
      "name": "CVE-2025-40569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40569"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-4373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
    },
    {
      "name": "CVE-2025-4598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-6779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-57996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
    },
    {
      "name": "CVE-2023-46219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2024-45490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2024-45491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2024-26596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26596"
    },
    {
      "name": "CVE-2023-4527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2024-53166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
    },
    {
      "name": "CVE-2025-46836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46836"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-40567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40567"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-28085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2025-21702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2025-21724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
    },
    {
      "name": "CVE-2025-21701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2023-4911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
    },
    {
      "name": "CVE-2024-6387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
    },
    {
      "name": "CVE-2023-51384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
    },
    {
      "name": "CVE-2021-41617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
    },
    {
      "name": "CVE-2024-50246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
    },
    {
      "name": "CVE-2024-34397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
    },
    {
      "name": "CVE-2023-6246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2025-21756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    },
    {
      "name": "CVE-2023-38545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
    }
  ],
  "initial_release_date": "2025-06-11T00:00:00",
  "last_revision_date": "2025-06-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0492",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-082556",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-633269",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-633269.html"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693776",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-693776.html"
    }
  ]
}
  CERTFR-2025-AVI-0463
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.137-1~deb11u1",
      "product": {
        "name": "Debian",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    },
    {
      "description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 5.10.237-1",
      "product": {
        "name": "Debian",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
    },
    {
      "name": "CVE-2023-52621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52621"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2023-52572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
    },
    {
      "name": "CVE-2024-26982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
    },
    {
      "name": "CVE-2024-27056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
    },
    {
      "name": "CVE-2024-26739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
    },
    {
      "name": "CVE-2024-26656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
    },
    {
      "name": "CVE-2021-47489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47489"
    },
    {
      "name": "CVE-2023-52757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
    },
    {
      "name": "CVE-2024-26928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26928"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2024-35867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
    },
    {
      "name": "CVE-2024-35943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
    },
    {
      "name": "CVE-2021-47247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47247"
    },
    {
      "name": "CVE-2023-52752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52752"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2024-39494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
    },
    {
      "name": "CVE-2023-52857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
    },
    {
      "name": "CVE-2024-26767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
    },
    {
      "name": "CVE-2024-38611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
    },
    {
      "name": "CVE-2024-36908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
    },
    {
      "name": "CVE-2024-41073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41073"
    },
    {
      "name": "CVE-2024-40973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40973"
    },
    {
      "name": "CVE-2022-48893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2024-43831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
    },
    {
      "name": "CVE-2024-44938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44938"
    },
    {
      "name": "CVE-2024-46812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
    },
    {
      "name": "CVE-2024-46821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
    },
    {
      "name": "CVE-2024-46753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
    },
    {
      "name": "CVE-2024-46772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46772"
    },
    {
      "name": "CVE-2024-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
    },
    {
      "name": "CVE-2024-42129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
    },
    {
      "name": "CVE-2024-46816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
    },
    {
      "name": "CVE-2024-47730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47730"
    },
    {
      "name": "CVE-2024-47753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47753"
    },
    {
      "name": "CVE-2024-47754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47754"
    },
    {
      "name": "CVE-2024-49960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2024-50063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2024-46733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
    },
    {
      "name": "CVE-2024-46823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
    },
    {
      "name": "CVE-2024-50154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50154"
    },
    {
      "name": "CVE-2024-50246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
    },
    {
      "name": "CVE-2024-53144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
    },
    {
      "name": "CVE-2024-53166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
    },
    {
      "name": "CVE-2024-56599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56599"
    },
    {
      "name": "CVE-2024-56609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
    },
    {
      "name": "CVE-2024-56664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
    },
    {
      "name": "CVE-2024-56608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56608"
    },
    {
      "name": "CVE-2024-56658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56658"
    },
    {
      "name": "CVE-2025-21647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
    },
    {
      "name": "CVE-2024-47726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47726"
    },
    {
      "name": "CVE-2024-50056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
    },
    {
      "name": "CVE-2025-21700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21700"
    },
    {
      "name": "CVE-2024-57979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
    },
    {
      "name": "CVE-2025-21715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
    },
    {
      "name": "CVE-2025-21719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
    },
    {
      "name": "CVE-2025-21728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
    },
    {
      "name": "CVE-2025-21753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
    },
    {
      "name": "CVE-2025-21802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
    },
    {
      "name": "CVE-2022-49309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49309"
    },
    {
      "name": "CVE-2022-49546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49546"
    },
    {
      "name": "CVE-2024-58014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
    },
    {
      "name": "CVE-2025-21718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2024-57973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
    },
    {
      "name": "CVE-2024-57980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
    },
    {
      "name": "CVE-2024-57981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
    },
    {
      "name": "CVE-2024-57986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
    },
    {
      "name": "CVE-2024-58001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
    },
    {
      "name": "CVE-2024-58007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
    },
    {
      "name": "CVE-2024-58010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
    },
    {
      "name": "CVE-2024-58016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
    },
    {
      "name": "CVE-2024-58017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2024-58051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
    },
    {
      "name": "CVE-2024-58052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
    },
    {
      "name": "CVE-2024-58055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
    },
    {
      "name": "CVE-2024-58058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
    },
    {
      "name": "CVE-2024-58063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
    },
    {
      "name": "CVE-2024-58069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
    },
    {
      "name": "CVE-2024-58071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
    },
    {
      "name": "CVE-2024-58072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
    },
    {
      "name": "CVE-2024-58083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
    },
    {
      "name": "CVE-2024-58085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
    },
    {
      "name": "CVE-2025-21711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
    },
    {
      "name": "CVE-2025-21722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
    },
    {
      "name": "CVE-2025-21726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
    },
    {
      "name": "CVE-2025-21727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
    },
    {
      "name": "CVE-2025-21731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
    },
    {
      "name": "CVE-2025-21735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
    },
    {
      "name": "CVE-2025-21736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
    },
    {
      "name": "CVE-2025-21744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
    },
    {
      "name": "CVE-2025-21745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
    },
    {
      "name": "CVE-2025-21749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2025-21804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
    },
    {
      "name": "CVE-2025-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
    },
    {
      "name": "CVE-2025-21811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
    },
    {
      "name": "CVE-2025-21814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2022-49219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49219"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2024-58002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2024-58079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
    },
    {
      "name": "CVE-2025-21756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
    },
    {
      "name": "CVE-2025-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
    },
    {
      "name": "CVE-2025-21891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
    },
    {
      "name": "CVE-2025-21702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2024-58090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-21721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
    },
    {
      "name": "CVE-2025-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2025-21898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
    },
    {
      "name": "CVE-2025-21899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
    },
    {
      "name": "CVE-2025-21909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
    },
    {
      "name": "CVE-2025-21910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
    },
    {
      "name": "CVE-2025-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
    },
    {
      "name": "CVE-2025-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
    },
    {
      "name": "CVE-2025-21914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
    },
    {
      "name": "CVE-2025-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
    },
    {
      "name": "CVE-2025-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
    },
    {
      "name": "CVE-2025-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
    },
    {
      "name": "CVE-2025-21919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
    },
    {
      "name": "CVE-2025-21920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
    },
    {
      "name": "CVE-2025-21922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
    },
    {
      "name": "CVE-2025-21924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
    },
    {
      "name": "CVE-2025-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
    },
    {
      "name": "CVE-2025-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
    },
    {
      "name": "CVE-2025-21936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
    },
    {
      "name": "CVE-2025-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
    },
    {
      "name": "CVE-2025-21938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
    },
    {
      "name": "CVE-2025-21944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
    },
    {
      "name": "CVE-2025-21945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
    },
    {
      "name": "CVE-2025-21947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
    },
    {
      "name": "CVE-2025-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
    },
    {
      "name": "CVE-2025-21950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
    },
    {
      "name": "CVE-2025-21951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
    },
    {
      "name": "CVE-2025-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
    },
    {
      "name": "CVE-2025-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
    },
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
    },
    {
      "name": "CVE-2025-21994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2022-49046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49046"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2024-46742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
    },
    {
      "name": "CVE-2025-22035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
    },
    {
      "name": "CVE-2025-22038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
    },
    {
      "name": "CVE-2025-22040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
    },
    {
      "name": "CVE-2025-22041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
    },
    {
      "name": "CVE-2025-22042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22049"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
    },
    {
      "name": "CVE-2025-22071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
    },
    {
      "name": "CVE-2025-22072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
    },
    {
      "name": "CVE-2025-22073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
    },
    {
      "name": "CVE-2025-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
    },
    {
      "name": "CVE-2025-22089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
    },
    {
      "name": "CVE-2025-22093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
    },
    {
      "name": "CVE-2025-22095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22095"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-22126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2022-49190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49190"
    },
    {
      "name": "CVE-2025-21872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
    },
    {
      "name": "CVE-2025-37752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
    },
    {
      "name": "CVE-2025-37778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37782"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-37818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37818"
    },
    {
      "name": "CVE-2025-37820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
    },
    {
      "name": "CVE-2025-37854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-37889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
    },
    {
      "name": "CVE-2025-37938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    }
  ],
  "initial_release_date": "2025-05-30T00:00:00",
  "last_revision_date": "2025-05-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0463",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
  "vendor_advisories": [
    {
      "published_at": "2025-05-25",
      "title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4178-1",
      "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
    },
    {
      "published_at": "2025-05-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4193-1",
      "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
    }
  ]
}
  CERTFR-2025-AVI-0743
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 24.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 22.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2024-53203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-38043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-21783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
    },
    {
      "name": "CVE-2025-21786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2024-50125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-38061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2024-35867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-38004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
    },
    {
      "name": "CVE-2024-46816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-21746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-38066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-37927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2024-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
    },
    {
      "name": "CVE-2025-38068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-21868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-38065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
    },
    {
      "name": "CVE-2025-38031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
    },
    {
      "name": "CVE-2024-49960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-38034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2025-38078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2025-38077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2022-48893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-38003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
    },
    {
      "name": "CVE-2025-37923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-38079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2024-46742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
    },
    {
      "name": "CVE-2024-50272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2024-27402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-38037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-38072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-38075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2025-38058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
    },
    {
      "name": "CVE-2024-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2024-26739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2024-49989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
    },
    {
      "name": "CVE-2024-36908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2024-50258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-38048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2024-54456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-21773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
    },
    {
      "name": "CVE-2024-38540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-38052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
    },
    {
      "name": "CVE-2025-38035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-38051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-38044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
    },
    {
      "name": "CVE-2025-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
    },
    {
      "name": "CVE-2024-35943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2022-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    }
  ],
  "initial_release_date": "2025-08-29T00:00:00",
  "last_revision_date": "2025-08-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0743",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": "2025-08-22",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7711-1",
      "url": "https://ubuntu.com/security/notices/USN-7711-1"
    },
    {
      "published_at": "2025-08-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7719-1",
      "url": "https://ubuntu.com/security/notices/USN-7719-1"
    },
    {
      "published_at": "2025-08-22",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7712-1",
      "url": "https://ubuntu.com/security/notices/USN-7712-1"
    }
  ]
}
  CERTFR-2025-AVI-0333
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Debian bookworm versions ant\u00e9rieures \u00e0 6.1.133-1",
      "product": {
        "name": "Debian",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
    },
    {
      "name": "CVE-2025-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
    },
    {
      "name": "CVE-2024-26656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
    },
    {
      "name": "CVE-2025-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
    },
    {
      "name": "CVE-2025-21951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
    },
    {
      "name": "CVE-2024-40973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40973"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2024-26767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
    },
    {
      "name": "CVE-2025-21922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
    },
    {
      "name": "CVE-2023-52927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-21904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2024-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
    },
    {
      "name": "CVE-2024-58005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
    },
    {
      "name": "CVE-2025-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
    },
    {
      "name": "CVE-2025-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
    },
    {
      "name": "CVE-2023-52857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-21993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
    },
    {
      "name": "CVE-2025-21914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
    },
    {
      "name": "CVE-2024-58090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-21986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
    },
    {
      "name": "CVE-2025-21909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
    },
    {
      "name": "CVE-2025-21959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2024-43831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
    },
    {
      "name": "CVE-2025-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-21997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
    },
    {
      "name": "CVE-2025-21947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
    },
    {
      "name": "CVE-2025-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
    },
    {
      "name": "CVE-2024-58079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
    },
    {
      "name": "CVE-2025-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
    },
    {
      "name": "CVE-2025-21898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
    },
    {
      "name": "CVE-2024-50056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
    },
    {
      "name": "CVE-2024-42129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2024-53166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
    },
    {
      "name": "CVE-2024-27056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-21950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
    },
    {
      "name": "CVE-2025-21899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
    },
    {
      "name": "CVE-2025-21994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
    },
    {
      "name": "CVE-2025-21943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
    },
    {
      "name": "CVE-2025-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
    },
    {
      "name": "CVE-2024-47754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47754"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2025-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
    },
    {
      "name": "CVE-2025-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
    },
    {
      "name": "CVE-2024-38611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
    },
    {
      "name": "CVE-2025-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
    },
    {
      "name": "CVE-2025-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-21702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
    },
    {
      "name": "CVE-2025-21926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
    },
    {
      "name": "CVE-2025-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
    },
    {
      "name": "CVE-2024-58002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
    },
    {
      "name": "CVE-2025-21944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
    },
    {
      "name": "CVE-2025-21905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
    },
    {
      "name": "CVE-2025-21920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
    },
    {
      "name": "CVE-2025-21891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2024-47753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47753"
    },
    {
      "name": "CVE-2025-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
    },
    {
      "name": "CVE-2025-21945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2024-26982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
    },
    {
      "name": "CVE-2025-21919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
    },
    {
      "name": "CVE-2024-46772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46772"
    },
    {
      "name": "CVE-2024-50246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
    },
    {
      "name": "CVE-2025-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
    },
    {
      "name": "CVE-2025-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
    },
    {
      "name": "CVE-2025-21756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    }
  ],
  "initial_release_date": "2025-04-18T00:00:00",
  "last_revision_date": "2025-04-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0333",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
  "vendor_advisories": [
    {
      "published_at": "2025-04-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-5900-1",
      "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
    }
  ]
}
  CERTFR-2025-AVI-0721
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 20.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 24.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 22.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2024-58088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
    },
    {
      "name": "CVE-2025-38043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
    },
    {
      "name": "CVE-2025-21783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
    },
    {
      "name": "CVE-2025-21786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
    },
    {
      "name": "CVE-2025-38002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38002"
    },
    {
      "name": "CVE-2025-21847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
    },
    {
      "name": "CVE-2025-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
    },
    {
      "name": "CVE-2025-21763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
    },
    {
      "name": "CVE-2025-37965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37965"
    },
    {
      "name": "CVE-2025-21796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
    },
    {
      "name": "CVE-2024-49950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49950"
    },
    {
      "name": "CVE-2025-21768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
    },
    {
      "name": "CVE-2025-21864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
    },
    {
      "name": "CVE-2025-37961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
    },
    {
      "name": "CVE-2025-38061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-21779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
    },
    {
      "name": "CVE-2025-38004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
    },
    {
      "name": "CVE-2025-38016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38016"
    },
    {
      "name": "CVE-2025-21712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
    },
    {
      "name": "CVE-2025-21746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
    },
    {
      "name": "CVE-2025-38066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
    },
    {
      "name": "CVE-2025-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
    },
    {
      "name": "CVE-2025-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
    },
    {
      "name": "CVE-2025-38022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
    },
    {
      "name": "CVE-2025-38068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
    },
    {
      "name": "CVE-2025-21772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
    },
    {
      "name": "CVE-2025-37971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37971"
    },
    {
      "name": "CVE-2025-21868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
    },
    {
      "name": "CVE-2025-38056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38056"
    },
    {
      "name": "CVE-2025-38027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
    },
    {
      "name": "CVE-2025-21792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
    },
    {
      "name": "CVE-2025-37993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37993"
    },
    {
      "name": "CVE-2025-37955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37955"
    },
    {
      "name": "CVE-2025-38015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
    },
    {
      "name": "CVE-2025-37958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
    },
    {
      "name": "CVE-2025-21855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
    },
    {
      "name": "CVE-2025-38065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
    },
    {
      "name": "CVE-2025-38031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
    },
    {
      "name": "CVE-2025-37950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37950"
    },
    {
      "name": "CVE-2025-21767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
    },
    {
      "name": "CVE-2025-38008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
    },
    {
      "name": "CVE-2025-38011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
    },
    {
      "name": "CVE-2025-21764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-38025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38025"
    },
    {
      "name": "CVE-2025-38034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
    },
    {
      "name": "CVE-2025-38095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
    },
    {
      "name": "CVE-2025-21838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
    },
    {
      "name": "CVE-2025-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
    },
    {
      "name": "CVE-2025-21704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
    },
    {
      "name": "CVE-2025-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2024-57834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
    },
    {
      "name": "CVE-2025-38078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
    },
    {
      "name": "CVE-2025-21791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
    },
    {
      "name": "CVE-2024-52559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
    },
    {
      "name": "CVE-2025-38077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-21795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
    },
    {
      "name": "CVE-2025-21758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
    },
    {
      "name": "CVE-2025-21780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
    },
    {
      "name": "CVE-2025-21776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
    },
    {
      "name": "CVE-2025-21706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
    },
    {
      "name": "CVE-2025-38014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
    },
    {
      "name": "CVE-2025-38003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
    },
    {
      "name": "CVE-2025-38007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
    },
    {
      "name": "CVE-2025-21760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
    },
    {
      "name": "CVE-2025-38079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2025-21785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
    },
    {
      "name": "CVE-2024-58086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
    },
    {
      "name": "CVE-2025-37999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37999"
    },
    {
      "name": "CVE-2025-38018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
    },
    {
      "name": "CVE-2025-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-21848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
    },
    {
      "name": "CVE-2025-37952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
    },
    {
      "name": "CVE-2025-38012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38012"
    },
    {
      "name": "CVE-2025-38019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
    },
    {
      "name": "CVE-2025-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
    },
    {
      "name": "CVE-2025-38037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
    },
    {
      "name": "CVE-2025-37962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
    },
    {
      "name": "CVE-2025-21862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
    },
    {
      "name": "CVE-2025-37972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
    },
    {
      "name": "CVE-2025-38010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
    },
    {
      "name": "CVE-2024-57977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-38013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
    },
    {
      "name": "CVE-2025-37956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-38072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-38075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
    },
    {
      "name": "CVE-2025-38058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
    },
    {
      "name": "CVE-2025-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2025-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2025-37951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
    },
    {
      "name": "CVE-2025-37947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
    },
    {
      "name": "CVE-2025-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
    },
    {
      "name": "CVE-2025-21761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
    },
    {
      "name": "CVE-2025-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
    },
    {
      "name": "CVE-2024-58020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
    },
    {
      "name": "CVE-2025-37973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
    },
    {
      "name": "CVE-2025-37996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37996"
    },
    {
      "name": "CVE-2025-21775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
    },
    {
      "name": "CVE-2025-21846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2025-37968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
    },
    {
      "name": "CVE-2025-38006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
    },
    {
      "name": "CVE-2025-38048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
    },
    {
      "name": "CVE-2025-21765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
    },
    {
      "name": "CVE-2025-21782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
    },
    {
      "name": "CVE-2024-54456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-21773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
    },
    {
      "name": "CVE-2025-21858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-21821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
    },
    {
      "name": "CVE-2025-38052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
    },
    {
      "name": "CVE-2025-38035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
    },
    {
      "name": "CVE-2025-37963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2025-37948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
    },
    {
      "name": "CVE-2025-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
    },
    {
      "name": "CVE-2025-21856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
    },
    {
      "name": "CVE-2025-37960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
    },
    {
      "name": "CVE-2025-38051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
    },
    {
      "name": "CVE-2025-37954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
    },
    {
      "name": "CVE-2025-38044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
    },
    {
      "name": "CVE-2025-37959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
    },
    {
      "name": "CVE-2025-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
    },
    {
      "name": "CVE-2025-21854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
    },
    {
      "name": "CVE-2023-52757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
    },
    {
      "name": "CVE-2025-21759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
    },
    {
      "name": "CVE-2023-52975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52975"
    },
    {
      "name": "CVE-2025-37966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37966"
    },
    {
      "name": "CVE-2025-38028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38028"
    },
    {
      "name": "CVE-2025-21790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
    },
    {
      "name": "CVE-2025-38020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
    },
    {
      "name": "CVE-2025-21835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
    },
    {
      "name": "CVE-2025-38021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38021"
    }
  ],
  "initial_release_date": "2025-08-22T00:00:00",
  "last_revision_date": "2025-08-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0721",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-1",
      "url": "https://ubuntu.com/security/notices/USN-7704-1"
    },
    {
      "published_at": "2025-08-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7703-1",
      "url": "https://ubuntu.com/security/notices/USN-7703-1"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-4",
      "url": "https://ubuntu.com/security/notices/USN-7704-4"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-3",
      "url": "https://ubuntu.com/security/notices/USN-7704-3"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7701-3",
      "url": "https://ubuntu.com/security/notices/USN-7701-3"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7682-6",
      "url": "https://ubuntu.com/security/notices/USN-7682-6"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7703-2",
      "url": "https://ubuntu.com/security/notices/USN-7703-2"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7703-3",
      "url": "https://ubuntu.com/security/notices/USN-7703-3"
    },
    {
      "published_at": "2025-08-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7701-1",
      "url": "https://ubuntu.com/security/notices/USN-7701-1"
    },
    {
      "published_at": "2025-08-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7704-2",
      "url": "https://ubuntu.com/security/notices/USN-7704-2"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7699-2",
      "url": "https://ubuntu.com/security/notices/USN-7699-2"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7701-2",
      "url": "https://ubuntu.com/security/notices/USN-7701-2"
    }
  ]
}
  msrc_cve-2025-21864
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2025-21864 tcp: drop secpath at the same time as we currently drop dst - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-21864.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "tcp: drop secpath at the same time as we currently drop dst",
    "tracking": {
      "current_release_date": "2025-04-09T00:00:00.000Z",
      "generator": {
        "date": "2025-10-20T03:02:47.313Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2025-21864",
      "initial_release_date": "2025-03-02T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2025-04-09T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cazl3 kernel 6.6.82.1-1",
                "product": {
                  "name": "\u003cazl3 kernel 6.6.82.1-1",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 kernel 6.6.82.1-1",
                "product": {
                  "name": "azl3 kernel 6.6.82.1-1",
                  "product_id": "17465"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 kernel 6.6.78.1-3",
                "product": {
                  "name": "\u003cazl3 kernel 6.6.78.1-3",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 kernel 6.6.78.1-3",
                "product": {
                  "name": "azl3 kernel 6.6.78.1-3",
                  "product_id": "17471"
                }
              }
            ],
            "category": "product_name",
            "name": "kernel"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 kernel 6.6.82.1-1 as a component of Azure Linux 3.0",
          "product_id": "17084-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 kernel 6.6.82.1-1 as a component of Azure Linux 3.0",
          "product_id": "17465-17084"
        },
        "product_reference": "17465",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 kernel 6.6.78.1-3 as a component of Azure Linux 3.0",
          "product_id": "17084-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 kernel 6.6.78.1-3 as a component of Azure Linux 3.0",
          "product_id": "17471-17084"
        },
        "product_reference": "17471",
        "relates_to_product_reference": "17084"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-21864",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "general",
          "text": "Linux",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "17465-17084",
          "17471-17084"
        ],
        "known_affected": [
          "17084-2",
          "17084-1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21864 tcp: drop secpath at the same time as we currently drop dst - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-21864.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-09T00:00:00.000Z",
          "details": "6.6.82.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-2",
            "17084-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "title": "tcp: drop secpath at the same time as we currently drop dst"
    }
  ]
}
  icsa-25-162-05
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting these vulnerabilities to CISA."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1.5 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nSiemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-082556 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory.  Further, CISA does not endorse any commercial product or service.  Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-082556.json"
      },
      {
        "category": "self",
        "summary": "SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-25-162-05 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-162-05.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-25-162-05 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5",
    "tracking": {
      "current_release_date": "2025-08-12T00:00:00.000000Z",
      "generator": {
        "date": "2025-08-14T23:08:52.425782Z",
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-25-162-05",
      "initial_release_date": "2025-06-10T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2025-06-10T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2025-08-12T00:00:00.000000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added CVE-2025-6395, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)",
                  "product_id": "CSAFPID-0001",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)",
                  "product_id": "CSAFPID-0002",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)",
                  "product_id": "CSAFPID-0003",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)",
                  "product_id": "CSAFPID-0004",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.5",
                "product": {
                  "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)",
                  "product_id": "CSAFPID-0005",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6AG1518-4AX00-4AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-41617",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-41617"
    },
    {
      "cve": "CVE-2023-4527",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4527"
    },
    {
      "cve": "CVE-2023-4806",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4806"
    },
    {
      "cve": "CVE-2023-4911",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4911"
    },
    {
      "cve": "CVE-2023-5363",
      "cwe": {
        "id": "CWE-684",
        "name": "Incorrect Provision of Specified Functionality"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST\u0027s SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2023-6246",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6246"
    },
    {
      "cve": "CVE-2023-6779",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6779"
    },
    {
      "cve": "CVE-2023-6780",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6780"
    },
    {
      "cve": "CVE-2023-28531",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-28531"
    },
    {
      "cve": "CVE-2023-38545",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "cwe": {
        "id": "CWE-73",
        "name": "External Control of File Name or Path"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-46218",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51384",
      "cwe": {
        "id": "CWE-304",
        "name": "Missing Critical Step in Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-51384"
    },
    {
      "cve": "CVE-2023-51385",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-51385"
    },
    {
      "cve": "CVE-2023-52927",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the exp not to be removed when the created ct will not be confirmed, like in OVS and TC conntrack in the following patches. This patch allows exp not to be removed by setting IPS_CONFIRMED in the status of the tmpl.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52927"
    },
    {
      "cve": "CVE-2024-2961",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-6119",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don\u0027t perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-6119"
    },
    {
      "cve": "CVE-2024-6387",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A security regression (CVE-2006-5051) was discovered in OpenSSH\u0027s server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-12133",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-12133"
    },
    {
      "cve": "CVE-2024-12243",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-12243"
    },
    {
      "cve": "CVE-2024-24855",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A race condition was found in the Linux kernel\u0027s scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-24855"
    },
    {
      "cve": "CVE-2024-26596",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: dsa: netdev_priv() dereference before check on non-DSA netdevice events.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26596"
    },
    {
      "cve": "CVE-2024-28085",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-33599",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow.  This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference.  This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients.  The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34397",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-34397"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-45490",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-45490"
    },
    {
      "cve": "CVE-2024-45491",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-45491"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-50246",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/ntfs3: Add rough attr alloc_size check",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50246"
    },
    {
      "cve": "CVE-2024-53166",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "block, bfq: bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd-\u003elock, however bfq_limit_depth() is deferencing bfqq from bic without the lock, this can lead to UAF if the io_context is shared by multiple tasks.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-53166"
    },
    {
      "cve": "CVE-2024-57977",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "memcg: A soft lockup vulnerability in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup was triggered.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-57977"
    },
    {
      "cve": "CVE-2024-57996",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net_sched: sch_sfq: vulnerability caused by incorrectly handling a packet limit of 1, leading to an array-index-out-of-bounds error and subsequent crash when the queue length is decremented for an empty slot.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-57996"
    },
    {
      "cve": "CVE-2024-58005",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "tpm: Change to kvalloc() in eventlog/acpi.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-58005"
    },
    {
      "cve": "CVE-2025-4373",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GLib is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-4373"
    },
    {
      "cve": "CVE-2025-4598",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\r\n\r\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-4598"
    },
    {
      "cve": "CVE-2025-6395",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-6395"
    },
    {
      "cve": "CVE-2025-21701",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: vulnerability arises because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, leading to potential use of destroyed locks, which is fixed by denying operations on devices being unregistered.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21701"
    },
    {
      "cve": "CVE-2025-21702",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21702"
    },
    {
      "cve": "CVE-2025-21712",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "md/md-bitmap: vulnerability caused by bitmap_get_stats() can be called even if the bitmap is destroyed or not fully initialized, leading to a kernel crash, which is fixed by synchronizing bitmap_get_stats() with bitmap_info.mutex.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21712"
    },
    {
      "cve": "CVE-2025-21724",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index(). Resolve a UBSAN shift-out-of-bounds issue in iova_bitmap_offset_to_index() where shifting the constant \"1\" (of type int) by bitmap-\u003emapped.pgshift (an unsigned long value) could result in undefined behavior. The constant \"1\" defaults to a 32-bit \"int\", and when \"pgshift\" exceeds 31 (e.g., pgshift = 63) the shift operation overflows, as the result cannot be represented in a 32-bit type.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21724"
    },
    {
      "cve": "CVE-2025-21728",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "bpf: Send signals asynchronously if !preemptible BPF programs can execute in all kinds of contexts and when a program running in a non-preemptible context uses the bpf_send_signal() kfunc, it will cause issues because this kfunc can sleep.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21728"
    },
    {
      "cve": "CVE-2025-21745",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nblk-cgroup: Fix class @block_class\u0027s subsystem refcount leakage\r\n\r\nblkcg_fill_root_iostats() iterates over @block_class\u0027s devices by\r\nclass_dev_iter_(init|next)(), but does not end iterating with\r\nclass_dev_iter_exit(), so causes the class\u0027s subsystem refcount leakage.\r\n\r\nFix by ending the iterating with class_dev_iter_exit().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21745"
    },
    {
      "cve": "CVE-2025-21756",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21756"
    },
    {
      "cve": "CVE-2025-21758",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21758"
    },
    {
      "cve": "CVE-2025-21765",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21765"
    },
    {
      "cve": "CVE-2025-21766",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv4: use RCU protection in __ip_rt_update_pmtu(). __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21766"
    },
    {
      "cve": "CVE-2025-21767",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context The following bug report happened with a PREEMPT_RT kernel: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2012, name: kwatchdog preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 get_random_u32+0x4f/0x110 clocksource_verify_choose_cpus+0xab/0x1a0 clocksource_verify_percpu.part.0+0x6b/0x330 clocksource_watchdog_kthread+0x193/0x1a0 It is due to the fact that clocksource_verify_choose_cpus() is invoked with preemption disabled. This function invokes get_random_u32() to obtain random numbers for choosing CPUs. The batched_entropy_32 local lock and/or the base_crng.lock spinlock in driver/char/random.c will be acquired during the call. In PREEMPT_RT kernel, they are both sleeping locks and so cannot be acquired in atomic context. Fix this problem by using migrate_disable() to allow smp_processor_id() to be reliably used without introducing atomic context. preempt_disable() is then called after clocksource_verify_choose_cpus() but before the clocksource measurement is being run to avoid introducing unexpected latency.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21767"
    },
    {
      "cve": "CVE-2025-21795",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "NFSD: hang in nfsd4_shutdown_callback. If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21795"
    },
    {
      "cve": "CVE-2025-21796",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nfsd: clear acl_access/acl_default after releasing them If getting acl_default fails, acl_access and acl_default will be released simultaneously.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21796"
    },
    {
      "cve": "CVE-2025-21848",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfp: bpf: Add check for nfp_app_ctrl_msg_alloc()\r\n\r\nAdd check for the return value of nfp_app_ctrl_msg_alloc() in\r\nnfp_bpf_cmsg_alloc() to prevent null pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21848"
    },
    {
      "cve": "CVE-2025-21862",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "drop_monitor: incorrect initialization order. If drop_monitor is built as a kernel module, syzkaller may have time to send a netlink NET_DM_CMD_START message during the module loading. This will call the net_dm_monitor_start() function that uses a spinlock that has not yet been initialized.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21862"
    },
    {
      "cve": "CVE-2025-21864",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: drop secpath at the same time as we currently drop dst\r\n\r\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\r\nrunning tests that boil down to:\r\n - create a pair of netns\r\n - run a basic TCP test over ipcomp6\r\n - delete the pair of netns\r\n\r\nThe xfrm_state found on spi_byaddr was not deleted at the time we\r\ndelete the netns, because we still have a reference on it. This\r\nlingering reference comes from a secpath (which holds a ref on the\r\nxfrm_state), which is still attached to an skb. This skb is not\r\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\r\nskb_attempt_defer_free.\r\n\r\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\r\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\r\nthat case, we still have a reference on the xfrm_state that we don\u0027t\r\nexpect at this point.\r\n\r\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\r\nlonger needed, so let\u0027s also drop the secpath. At this point,\r\ntcp_filter has already called into the LSM hooks that may require the\r\nsecpath, so it should not be needed anymore. However, in some of those\r\nplaces, the MPTCP extension has just been attached to the skb, so we\r\ncannot simply drop all extensions.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21864"
    },
    {
      "cve": "CVE-2025-21865",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Commit eb28fd76c0a0 (\"gtp: Destroy device along with udp socket\u0027s netns dismantle.\") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl() to destroy devices in each netns as done in geneve and ip tunnels. However, this could trigger -\u003edellink() twice for the same device during -\u003eexit_batch_rtnl().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21865"
    },
    {
      "cve": "CVE-2025-26465",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-26465"
    },
    {
      "cve": "CVE-2025-31115",
      "cwe": {
        "id": "CWE-826",
        "name": "Premature Release of Resource During Expected Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The threaded .xz decoder in liblzma has a vulnerability that can at least result in a crash (denial of service). The effects include heap use after free and writing to an address based on the null pointer plus an offset.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-31115"
    },
    {
      "cve": "CVE-2025-32988",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-32988"
    },
    {
      "cve": "CVE-2025-32989",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-32989"
    },
    {
      "cve": "CVE-2025-46836",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net-tools is a collection of programs that form the base set of the NET-3 networking distribution for the Linux operating system. Inn versions up to and including 2.10, the Linux network utilities (like ifconfig) from the net-tools package do not properly validate the structure of /proc files when showing interfaces. `get_name()` in `interface.c` copies interface labels from `/proc/net/dev` into a fixed 16-byte stack buffer without bounds checking, leading to possible arbitrary code execution or crash. The known attack path does not require privilege but also does not provide privilege escalation in this scenario. A patch is available and expected to be part of version 2.20.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "none_available",
          "details": "Currently no fix is available",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-46836"
    }
  ]
}
  ncsc-2025-0187
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als RUGGEDCOM, SCALANCE, SIMATIC en Tecnomatix",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Spoofing\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Use of NullPointerException Catch to Detect NULL Pointer Dereference",
        "title": "CWE-395"
      },
      {
        "category": "general",
        "text": "Insufficient Entropy in PRNG",
        "title": "CWE-332"
      },
      {
        "category": "general",
        "text": "Improper Verification of Source of a Communication Channel",
        "title": "CWE-940"
      },
      {
        "category": "general",
        "text": "Return of Pointer Value Outside of Expected Range",
        "title": "CWE-466"
      },
      {
        "category": "general",
        "text": "Detection of Error Condition Without Action",
        "title": "CWE-390"
      },
      {
        "category": "general",
        "text": "Premature Release of Resource During Expected Lifetime",
        "title": "CWE-826"
      },
      {
        "category": "general",
        "text": "Truncation of Security-relevant Information",
        "title": "CWE-222"
      },
      {
        "category": "general",
        "text": "CWE-310",
        "title": "CWE-310"
      },
      {
        "category": "general",
        "text": "Improper Check for Dropped Privileges",
        "title": "CWE-273"
      },
      {
        "category": "general",
        "text": "Signal Handler Race Condition",
        "title": "CWE-364"
      },
      {
        "category": "general",
        "text": "Improper Update of Reference Count",
        "title": "CWE-911"
      },
      {
        "category": "general",
        "text": "Incorrect Calculation of Buffer Size",
        "title": "CWE-131"
      },
      {
        "category": "general",
        "text": "Missing Critical Step in Authentication",
        "title": "CWE-304"
      },
      {
        "category": "general",
        "text": "Incorrect Provision of Specified Functionality",
        "title": "CWE-684"
      },
      {
        "category": "general",
        "text": "Improper Handling of Length Parameter Inconsistency",
        "title": "CWE-130"
      },
      {
        "category": "general",
        "text": "Privilege Chaining",
        "title": "CWE-268"
      },
      {
        "category": "general",
        "text": "Race Condition within a Thread",
        "title": "CWE-366"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Escape, Meta, or Control Sequences",
        "title": "CWE-150"
      },
      {
        "category": "general",
        "text": "Insertion of Sensitive Information Into Sent Data",
        "title": "CWE-201"
      },
      {
        "category": "general",
        "text": "Inefficient Algorithmic Complexity",
        "title": "CWE-407"
      },
      {
        "category": "general",
        "text": "CWE-371",
        "title": "CWE-371"
      },
      {
        "category": "general",
        "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
        "title": "CWE-367"
      },
      {
        "category": "general",
        "text": "Improper Locking",
        "title": "CWE-667"
      },
      {
        "category": "general",
        "text": "Missing Encryption of Sensitive Data",
        "title": "CWE-311"
      },
      {
        "category": "general",
        "text": "Improper Check or Handling of Exceptional Conditions",
        "title": "CWE-703"
      },
      {
        "category": "general",
        "text": "Use of Uninitialized Resource",
        "title": "CWE-908"
      },
      {
        "category": "general",
        "text": "Reachable Assertion",
        "title": "CWE-617"
      },
      {
        "category": "general",
        "text": "Improper Validation of Array Index",
        "title": "CWE-129"
      },
      {
        "category": "general",
        "text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
        "title": "CWE-124"
      },
      {
        "category": "general",
        "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
        "title": "CWE-843"
      },
      {
        "category": "general",
        "text": "Insufficient Verification of Data Authenticity",
        "title": "CWE-345"
      },
      {
        "category": "general",
        "text": "Improper Validation of Integrity Check Value",
        "title": "CWE-354"
      },
      {
        "category": "general",
        "text": "Missing Cryptographic Step",
        "title": "CWE-325"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Authentication Bypass by Spoofing",
        "title": "CWE-290"
      },
      {
        "category": "general",
        "text": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)",
        "title": "CWE-99"
      },
      {
        "category": "general",
        "text": "Improper Initialization",
        "title": "CWE-665"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
        "title": "CWE-757"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Improper Restriction of XML External Entity Reference",
        "title": "CWE-611"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "External Control of File Name or Path",
        "title": "CWE-73"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Incorrect Authorization",
        "title": "CWE-863"
      },
      {
        "category": "general",
        "text": "Incorrect Default Permissions",
        "title": "CWE-276"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-082556.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-345750.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-486186.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-513708.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-633269.pdf"
      },
      {
        "category": "external",
        "summary": "Reference - ncscclear",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-693776.pdf"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Siemens producten",
    "tracking": {
      "current_release_date": "2025-06-10T13:11:56.672768Z",
      "generator": {
        "date": "2025-06-05T14:45:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.1"
        }
      },
      "id": "NCSC-2025-0187",
      "initial_release_date": "2025-06-10T13:11:56.672768Z",
      "revision_history": [
        {
          "date": "2025-06-10T13:11:56.672768Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/none",
                    "product": {
                      "name": "vers:unknown/none",
                      "product_id": "CSAFPID-1211853"
                    }
                  }
                ],
                "category": "product_name",
                "name": "SIMATIC S7-1500"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:siemens/3.1.0",
                    "product": {
                      "name": "vers:siemens/3.1.0",
                      "product_id": "CSAFPID-1195553"
                    }
                  }
                ],
                "category": "product_name",
                "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP Firmware"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/1.0",
                    "product": {
                      "name": "vers:unknown/1.0",
                      "product_id": "CSAFPID-1211202"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Simatic S7-1500 Tm Mfp Firmware"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:siemens/7.4.3",
                    "product": {
                      "name": "vers:siemens/7.4.3",
                      "product_id": "CSAFPID-2849543"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/none",
                    "product": {
                      "name": "vers:unknown/none",
                      "product_id": "CSAFPID-1756091"
                    }
                  }
                ],
                "category": "product_name",
                "name": "RUGGEDCOM APE1808 Firmware"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/none",
                    "product": {
                      "name": "vers:unknown/none",
                      "product_id": "CSAFPID-2619544"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Ruggedcom Ape1808"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:siemens/3.0.0",
                    "product": {
                      "name": "vers:siemens/3.0.0",
                      "product_id": "CSAFPID-2082475"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Scalance W700 Ieee 802.11Ax Firmware"
              }
            ],
            "category": "product_family",
            "name": "Siemens"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266669"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266670"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266671"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266672"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "vers:all/*",
                  "product_id": "CSAFPID-2460438"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:unknown/\u003cv1.3.0",
                "product": {
                  "name": "vers:unknown/\u003cv1.3.0",
                  "product_id": "CSAFPID-1270701"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 TM MFP - BIOS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/\u003cv1.1",
                "product": {
                  "name": "vers:unknown/\u003cv1.1",
                  "product_id": "CSAFPID-1270700"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003e=v3.1.0",
                "product": {
                  "name": "vers:all/\u003e=v3.1.0",
                  "product_id": "CSAFPID-1266673"
                }
              }
            ],
            "category": "product_name",
            "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "vers:all/*",
                  "product_id": "CSAFPID-1272525"
                }
              }
            ],
            "category": "product_name",
            "name": "RUGGEDCOM APE1808"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-126262",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "ruggedcom_ape1808"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "vers:all/*",
                  "product_id": "CSAFPID-2905706"
                }
              }
            ],
            "category": "product_name",
            "name": "Energy Services"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv2404.0013",
                "product": {
                  "name": "vers:all/\u003cv2404.0013",
                  "product_id": "CSAFPID-2905742"
                }
              }
            ],
            "category": "product_name",
            "name": "Tecnomatix Plant Simulation V2404"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905748"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905793"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC316-8 (6GK5324-8TS00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905749"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905794"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC324-4 (6GK5328-4TS00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905750"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905795"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905751"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905796"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC332 (6GK5332-0GA00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905752"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905797"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC416-8 (6GK5424-8TR00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905753"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905798"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC424-4 (6GK5428-4TR00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905754"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905799"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC432 (6GK5432-0GR00-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905755"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905800"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905756"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905801"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905757"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905802"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905758"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905803"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905759"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905804"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR302-32 (6GK5334-5TS00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905760"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905805"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR302-32 (6GK5334-5TS00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905761"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905806"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR302-32 (6GK5334-5TS00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905762"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905807"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR322-12 (6GK5334-3TS00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905763"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905808"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR322-12 (6GK5334-3TS00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905764"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905809"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR322-12 (6GK5334-3TS00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905765"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905810"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR326-8 (6GK5334-2TS00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905766"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905811"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR326-8 (6GK5334-2TS00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905767"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905812"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR326-8 (6GK5334-2TS00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905768"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905813"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905769"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905814"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR502-32 (6GK5534-5TR00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905770"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905815"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR502-32 (6GK5534-5TR00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905771"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905816"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR502-32 (6GK5534-5TR00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905772"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905817"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR522-12 (6GK5534-3TR00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905773"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905818"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR522-12 (6GK5534-3TR00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905774"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905819"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR522-12 (6GK5534-3TR00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905775"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905820"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR526-8 (6GK5534-2TR00-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905776"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905821"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR526-8 (6GK5534-2TR00-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905777"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905822"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR526-8 (6GK5534-2TR00-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905778"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905823"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905786"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905831"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905785"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905830"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905787"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905832"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905783"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905828"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905782"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905827"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905784"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905829"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905780"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905825"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905779"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905824"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.1",
                "product": {
                  "name": "vers:all/\u003cv3.1",
                  "product_id": "CSAFPID-2905781"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:all/\u003cv3.2",
                "product": {
                  "name": "vers:all/\u003cv3.2",
                  "product_id": "CSAFPID-2905826"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-41617",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        },
        {
          "category": "other",
          "text": "Improper Check for Dropped Privileges",
          "title": "CWE-273"
        },
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-41617 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-41617.json"
        }
      ],
      "title": "CVE-2021-41617"
    },
    {
      "cve": "CVE-2023-4527",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4527 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4527.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-4527"
    },
    {
      "cve": "CVE-2023-4806",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4806 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4806.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-4806"
    },
    {
      "cve": "CVE-2023-4911",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4911 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4911.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-4911"
    },
    {
      "cve": "CVE-2023-5363",
      "cwe": {
        "id": "CWE-325",
        "name": "Missing Cryptographic Step"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Cryptographic Step",
          "title": "CWE-325"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Incorrect Provision of Specified Functionality",
          "title": "CWE-684"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5363 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-5363.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2023-6246",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6246 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6246.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-6246"
    },
    {
      "cve": "CVE-2023-6779",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6779 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6779.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-6779"
    },
    {
      "cve": "CVE-2023-6780",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "other",
          "text": "Incorrect Calculation of Buffer Size",
          "title": "CWE-131"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6780 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-6780.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-6780"
    },
    {
      "cve": "CVE-2023-28531",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-28531 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-28531.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-28531"
    },
    {
      "cve": "CVE-2023-38545",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38545 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-38545.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "cwe": {
        "id": "CWE-73",
        "name": "External Control of File Name or Path"
      },
      "notes": [
        {
          "category": "other",
          "text": "External Control of File Name or Path",
          "title": "CWE-73"
        },
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38546 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-38546.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-44487 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-44487.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-46218",
      "cwe": {
        "id": "CWE-201",
        "name": "Insertion of Sensitive Information Into Sent Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insertion of Sensitive Information Into Sent Data",
          "title": "CWE-201"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46218 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46218.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Encryption of Sensitive Data",
          "title": "CWE-311"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46219 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46219.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Truncation of Security-relevant Information",
          "title": "CWE-222"
        },
        {
          "category": "other",
          "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
          "title": "CWE-757"
        },
        {
          "category": "other",
          "text": "Improper Validation of Integrity Check Value",
          "title": "CWE-354"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:L/U:Amber",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-48795 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-48795.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51384",
      "cwe": {
        "id": "CWE-304",
        "name": "Missing Critical Step in Authentication"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Critical Step in Authentication",
          "title": "CWE-304"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-51384 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-51384.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-51384"
    },
    {
      "cve": "CVE-2023-51385",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-51385 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-51385.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2023-51385"
    },
    {
      "cve": "CVE-2023-52927",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-52927 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-52927.json"
        }
      ],
      "title": "CVE-2023-52927"
    },
    {
      "cve": "CVE-2024-2961",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2961 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-2961.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-6119",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
          "title": "CWE-843"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6119 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6119.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-6119"
    },
    {
      "cve": "CVE-2024-6387",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Signal Handler Race Condition",
          "title": "CWE-364"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6387 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6387.json"
        }
      ],
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-12133",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Inefficient Algorithmic Complexity",
          "title": "CWE-407"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-12133 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
        }
      ],
      "title": "CVE-2024-12133"
    },
    {
      "cve": "CVE-2024-12243",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Inefficient Algorithmic Complexity",
          "title": "CWE-407"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-12243 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12243.json"
        }
      ],
      "title": "CVE-2024-12243"
    },
    {
      "cve": "CVE-2024-24855",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        },
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24855 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-24855.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-24855"
    },
    {
      "cve": "CVE-2024-26596",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26596 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-26596.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-26596"
    },
    {
      "cve": "CVE-2024-28085",
      "cwe": {
        "id": "CWE-268",
        "name": "Privilege Chaining"
      },
      "notes": [
        {
          "category": "other",
          "text": "Privilege Chaining",
          "title": "CWE-268"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Escape, Meta, or Control Sequences",
          "title": "CWE-150"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28085 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28085.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-33599",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33599 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33599.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33600 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33600.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "cwe": {
        "id": "CWE-703",
        "name": "Improper Check or Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        },
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33601 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33601.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "other",
          "text": "Return of Pointer Value Outside of Expected Range",
          "title": "CWE-466"
        },
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33602 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-33602.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34397",
      "cwe": {
        "id": "CWE-940",
        "name": "Improper Verification of Source of a Communication Channel"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Verification of Source of a Communication Channel",
          "title": "CWE-940"
        },
        {
          "category": "other",
          "text": "Authentication Bypass by Spoofing",
          "title": "CWE-290"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-34397 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-34397.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-34397"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        },
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37370 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37370.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37371 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37371.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-41797",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-41797 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-41797.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-41797"
    },
    {
      "cve": "CVE-2024-45490",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "other",
          "text": "Incorrect Calculation of Buffer Size",
          "title": "CWE-131"
        },
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45490 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45490.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-45490"
    },
    {
      "cve": "CVE-2024-45491",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45491 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45491.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-45491"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45492 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-45492.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-50246",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50246 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50246.json"
        }
      ],
      "title": "CVE-2024-50246"
    },
    {
      "cve": "CVE-2024-53166",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-53166 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-53166.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-53166"
    },
    {
      "cve": "CVE-2024-57977",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Locking",
          "title": "CWE-667"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-57977 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57977.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-57977"
    },
    {
      "cve": "CVE-2024-57996",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Array Index",
          "title": "CWE-129"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-57996 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57996.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-57996"
    },
    {
      "cve": "CVE-2024-58005",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)",
          "title": "CWE-99"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-58005 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-58005.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2024-58005"
    },
    {
      "cve": "CVE-2025-0133",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:M/U:Amber",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-0133 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0133.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-0133"
    },
    {
      "cve": "CVE-2025-4373",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
          "title": "CWE-124"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-4373 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4373.json"
        }
      ],
      "title": "CVE-2025-4373"
    },
    {
      "cve": "CVE-2025-4598",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Signal Handler Race Condition",
          "title": "CWE-364"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-4598 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4598.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-4598"
    },
    {
      "cve": "CVE-2025-21701",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21701 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21701.json"
        }
      ],
      "title": "CVE-2025-21701"
    },
    {
      "cve": "CVE-2025-21702",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21702 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21702.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21702"
    },
    {
      "cve": "CVE-2025-21712",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21712 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21712.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21712"
    },
    {
      "cve": "CVE-2025-21724",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21724 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21724.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21724"
    },
    {
      "cve": "CVE-2025-21728",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21728 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21728.json"
        }
      ],
      "title": "CVE-2025-21728"
    },
    {
      "cve": "CVE-2025-21745",
      "cwe": {
        "id": "CWE-911",
        "name": "Improper Update of Reference Count"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Update of Reference Count",
          "title": "CWE-911"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21745 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21745.json"
        }
      ],
      "title": "CVE-2025-21745"
    },
    {
      "cve": "CVE-2025-21756",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21756 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21756.json"
        }
      ],
      "title": "CVE-2025-21756"
    },
    {
      "cve": "CVE-2025-21758",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21758 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21758.json"
        }
      ],
      "title": "CVE-2025-21758"
    },
    {
      "cve": "CVE-2025-21765",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21765 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21765.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21765"
    },
    {
      "cve": "CVE-2025-21766",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21766 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21766.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21766"
    },
    {
      "cve": "CVE-2025-21767",
      "cwe": {
        "id": "CWE-332",
        "name": "Insufficient Entropy in PRNG"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Entropy in PRNG",
          "title": "CWE-332"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21767 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21767.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21767"
    },
    {
      "cve": "CVE-2025-21795",
      "cwe": {
        "id": "CWE-371",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-371",
          "title": "CWE-371"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21795 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21795.json"
        }
      ],
      "title": "CVE-2025-21795"
    },
    {
      "cve": "CVE-2025-21796",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21796 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21796.json"
        }
      ],
      "title": "CVE-2025-21796"
    },
    {
      "cve": "CVE-2025-21848",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Use of NullPointerException Catch to Detect NULL Pointer Dereference",
          "title": "CWE-395"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21848 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21848.json"
        }
      ],
      "title": "CVE-2025-21848"
    },
    {
      "cve": "CVE-2025-21862",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Initialization",
          "title": "CWE-665"
        },
        {
          "category": "other",
          "text": "Use of Uninitialized Resource",
          "title": "CWE-908"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21862 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21862.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-21862"
    },
    {
      "cve": "CVE-2025-21864",
      "cwe": {
        "id": "CWE-371",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-371",
          "title": "CWE-371"
        },
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21864 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21864.json"
        }
      ],
      "title": "CVE-2025-21864"
    },
    {
      "cve": "CVE-2025-21865",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21865 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21865.json"
        }
      ],
      "title": "CVE-2025-21865"
    },
    {
      "cve": "CVE-2025-26465",
      "cwe": {
        "id": "CWE-310",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-310",
          "title": "CWE-310"
        },
        {
          "category": "other",
          "text": "Detection of Error Condition Without Action",
          "title": "CWE-390"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26465 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26465.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-26465"
    },
    {
      "cve": "CVE-2025-31115",
      "cwe": {
        "id": "CWE-366",
        "name": "Race Condition within a Thread"
      },
      "notes": [
        {
          "category": "other",
          "text": "Race Condition within a Thread",
          "title": "CWE-366"
        },
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "other",
          "text": "Premature Release of Resource During Expected Lifetime",
          "title": "CWE-826"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-31115 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31115.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-31115"
    },
    {
      "cve": "CVE-2025-32454",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-32454 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32454.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-32454"
    },
    {
      "cve": "CVE-2025-40567",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-40567 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40567.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-40567"
    },
    {
      "cve": "CVE-2025-40568",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-40568 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40568.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-40568"
    },
    {
      "cve": "CVE-2025-40569",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-40569 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40569.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-40569"
    },
    {
      "cve": "CVE-2025-40585",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Default Permissions",
          "title": "CWE-276"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-40585 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40585.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-40585"
    },
    {
      "cve": "CVE-2025-46836",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1211853",
          "CSAFPID-1266669",
          "CSAFPID-1266670",
          "CSAFPID-1195553",
          "CSAFPID-1266671",
          "CSAFPID-1266672",
          "CSAFPID-2460438",
          "CSAFPID-1270701",
          "CSAFPID-1270700",
          "CSAFPID-1266673",
          "CSAFPID-1211202",
          "CSAFPID-1272525",
          "CSAFPID-2849543",
          "CSAFPID-1756091",
          "CSAFPID-2619544",
          "CSAFPID-126262",
          "CSAFPID-2082475",
          "CSAFPID-2905706",
          "CSAFPID-2905742",
          "CSAFPID-2905748",
          "CSAFPID-2905793",
          "CSAFPID-2905749",
          "CSAFPID-2905794",
          "CSAFPID-2905750",
          "CSAFPID-2905795",
          "CSAFPID-2905751",
          "CSAFPID-2905796",
          "CSAFPID-2905752",
          "CSAFPID-2905797",
          "CSAFPID-2905753",
          "CSAFPID-2905798",
          "CSAFPID-2905754",
          "CSAFPID-2905799",
          "CSAFPID-2905755",
          "CSAFPID-2905800",
          "CSAFPID-2905756",
          "CSAFPID-2905801",
          "CSAFPID-2905757",
          "CSAFPID-2905802",
          "CSAFPID-2905758",
          "CSAFPID-2905803",
          "CSAFPID-2905759",
          "CSAFPID-2905804",
          "CSAFPID-2905760",
          "CSAFPID-2905805",
          "CSAFPID-2905761",
          "CSAFPID-2905806",
          "CSAFPID-2905762",
          "CSAFPID-2905807",
          "CSAFPID-2905763",
          "CSAFPID-2905808",
          "CSAFPID-2905764",
          "CSAFPID-2905809",
          "CSAFPID-2905765",
          "CSAFPID-2905810",
          "CSAFPID-2905766",
          "CSAFPID-2905811",
          "CSAFPID-2905767",
          "CSAFPID-2905812",
          "CSAFPID-2905768",
          "CSAFPID-2905813",
          "CSAFPID-2905769",
          "CSAFPID-2905814",
          "CSAFPID-2905770",
          "CSAFPID-2905815",
          "CSAFPID-2905771",
          "CSAFPID-2905816",
          "CSAFPID-2905772",
          "CSAFPID-2905817",
          "CSAFPID-2905773",
          "CSAFPID-2905818",
          "CSAFPID-2905774",
          "CSAFPID-2905819",
          "CSAFPID-2905775",
          "CSAFPID-2905820",
          "CSAFPID-2905776",
          "CSAFPID-2905821",
          "CSAFPID-2905777",
          "CSAFPID-2905822",
          "CSAFPID-2905778",
          "CSAFPID-2905823",
          "CSAFPID-2905786",
          "CSAFPID-2905831",
          "CSAFPID-2905785",
          "CSAFPID-2905830",
          "CSAFPID-2905787",
          "CSAFPID-2905832",
          "CSAFPID-2905783",
          "CSAFPID-2905828",
          "CSAFPID-2905782",
          "CSAFPID-2905827",
          "CSAFPID-2905784",
          "CSAFPID-2905829",
          "CSAFPID-2905780",
          "CSAFPID-2905825",
          "CSAFPID-2905779",
          "CSAFPID-2905824",
          "CSAFPID-2905781",
          "CSAFPID-2905826"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-46836 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46836.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1211853",
            "CSAFPID-1266669",
            "CSAFPID-1266670",
            "CSAFPID-1195553",
            "CSAFPID-1266671",
            "CSAFPID-1266672",
            "CSAFPID-2460438",
            "CSAFPID-1270701",
            "CSAFPID-1270700",
            "CSAFPID-1266673",
            "CSAFPID-1211202",
            "CSAFPID-1272525",
            "CSAFPID-2849543",
            "CSAFPID-1756091",
            "CSAFPID-2619544",
            "CSAFPID-126262",
            "CSAFPID-2082475",
            "CSAFPID-2905706",
            "CSAFPID-2905742",
            "CSAFPID-2905748",
            "CSAFPID-2905793",
            "CSAFPID-2905749",
            "CSAFPID-2905794",
            "CSAFPID-2905750",
            "CSAFPID-2905795",
            "CSAFPID-2905751",
            "CSAFPID-2905796",
            "CSAFPID-2905752",
            "CSAFPID-2905797",
            "CSAFPID-2905753",
            "CSAFPID-2905798",
            "CSAFPID-2905754",
            "CSAFPID-2905799",
            "CSAFPID-2905755",
            "CSAFPID-2905800",
            "CSAFPID-2905756",
            "CSAFPID-2905801",
            "CSAFPID-2905757",
            "CSAFPID-2905802",
            "CSAFPID-2905758",
            "CSAFPID-2905803",
            "CSAFPID-2905759",
            "CSAFPID-2905804",
            "CSAFPID-2905760",
            "CSAFPID-2905805",
            "CSAFPID-2905761",
            "CSAFPID-2905806",
            "CSAFPID-2905762",
            "CSAFPID-2905807",
            "CSAFPID-2905763",
            "CSAFPID-2905808",
            "CSAFPID-2905764",
            "CSAFPID-2905809",
            "CSAFPID-2905765",
            "CSAFPID-2905810",
            "CSAFPID-2905766",
            "CSAFPID-2905811",
            "CSAFPID-2905767",
            "CSAFPID-2905812",
            "CSAFPID-2905768",
            "CSAFPID-2905813",
            "CSAFPID-2905769",
            "CSAFPID-2905814",
            "CSAFPID-2905770",
            "CSAFPID-2905815",
            "CSAFPID-2905771",
            "CSAFPID-2905816",
            "CSAFPID-2905772",
            "CSAFPID-2905817",
            "CSAFPID-2905773",
            "CSAFPID-2905818",
            "CSAFPID-2905774",
            "CSAFPID-2905819",
            "CSAFPID-2905775",
            "CSAFPID-2905820",
            "CSAFPID-2905776",
            "CSAFPID-2905821",
            "CSAFPID-2905777",
            "CSAFPID-2905822",
            "CSAFPID-2905778",
            "CSAFPID-2905823",
            "CSAFPID-2905786",
            "CSAFPID-2905831",
            "CSAFPID-2905785",
            "CSAFPID-2905830",
            "CSAFPID-2905787",
            "CSAFPID-2905832",
            "CSAFPID-2905783",
            "CSAFPID-2905828",
            "CSAFPID-2905782",
            "CSAFPID-2905827",
            "CSAFPID-2905784",
            "CSAFPID-2905829",
            "CSAFPID-2905780",
            "CSAFPID-2905825",
            "CSAFPID-2905779",
            "CSAFPID-2905824",
            "CSAFPID-2905781",
            "CSAFPID-2905826"
          ]
        }
      ],
      "title": "CVE-2025-46836"
    }
  ]
}
  fkie_cve-2025-21864
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/69cafd9413084cd5012cf5d7c7ec6f3d493726d9 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/87858bbf21da239ace300d61dd209907995c0491 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/9b6412e6979f6f9e0632075f8f008937b5cd4efd | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/cd34a07f744451e2ecf9005bb7d24d0b2fb83656 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f1d5e6a5e468308af7759cf5276779d3155c5e98 | Patch | 
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B2819D9-E557-41EC-A77B-F5A5992BBC20",
              "versionEndExcluding": "6.1.130",
              "versionStartIncluding": "5.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A93F3655-6FAF-43B0-8541-A212998F05B8",
              "versionEndExcluding": "6.6.80",
              "versionStartIncluding": "6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15370AEE-6D1C-49C3-8CB7-E889D5F92B6F",
              "versionEndExcluding": "6.12.17",
              "versionStartIncluding": "6.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "72E69ABB-9015-43A6-87E1-5150383CFFD9",
              "versionEndExcluding": "6.13.5",
              "versionStartIncluding": "6.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: drop secpath at the same time as we currently drop dst\n\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\nrunning tests that boil down to:\n - create a pair of netns\n - run a basic TCP test over ipcomp6\n - delete the pair of netns\n\nThe xfrm_state found on spi_byaddr was not deleted at the time we\ndelete the netns, because we still have a reference on it. This\nlingering reference comes from a secpath (which holds a ref on the\nxfrm_state), which is still attached to an skb. This skb is not\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\nskb_attempt_defer_free.\n\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\nthat case, we still have a reference on the xfrm_state that we don\u0027t\nexpect at this point.\n\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\nlonger needed, so let\u0027s also drop the secpath. At this point,\ntcp_filter has already called into the LSM hooks that may require the\nsecpath, so it should not be needed anymore. However, in some of those\nplaces, the MPTCP extension has just been attached to the skb, so we\ncannot simply drop all extensions."
    },
    {
      "lang": "es",
      "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: descartar secpath al mismo tiempo que descartamos dst Xiumei inform\u00f3 haber alcanzado el WARN en xfrm6_tunnel_net_exit mientras ejecutaba pruebas que se reducen a: - crear un par de netns - ejecutar una prueba TCP b\u00e1sica sobre ipcomp6 - eliminar el par de netns El xfrm_state encontrado en spi_byaddr no se elimin\u00f3 en el momento en que eliminamos los netns, porque a\u00fan tenemos una referencia en \u00e9l. Esta referencia persistente proviene de un secpath (que contiene una referencia en xfrm_state), que a\u00fan est\u00e1 adjunto a un skb. Este skb no se filtra, termina en sk_receive_queue y luego se libera mediante skb_attempt_defer_free. El problema ocurre cuando posponemos la liberaci\u00f3n de un skb (insertarlo en la lista defer_list de una CPU) y no limpiamos esa lista antes de eliminar netns. En ese caso, a\u00fan tenemos una referencia en xfrm_state inesperada en este momento. Ya eliminamos el dst del skb en la ruta de recepci\u00f3n TCP cuando ya no es necesario, as\u00ed que tambi\u00e9n eliminamos el secpath. En este punto, tcp_filter ya ha llamado a los ganchos LSM que podr\u00edan requerir el secpath, por lo que ya no deber\u00eda ser necesario. Sin embargo, en algunos de esos lugares, la extensi\u00f3n MPTCP se acaba de adjuntar al skb, por lo que no podemos simplemente eliminar todas las extensiones."
    }
  ],
  "id": "CVE-2025-21864",
  "lastModified": "2025-10-01T20:18:30.997",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-03-12T10:15:19.520",
  "references": [
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/69cafd9413084cd5012cf5d7c7ec6f3d493726d9"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/87858bbf21da239ace300d61dd209907995c0491"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/9b6412e6979f6f9e0632075f8f008937b5cd4efd"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/cd34a07f744451e2ecf9005bb7d24d0b2fb83656"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "tags": [
        "Patch"
      ],
      "url": "https://git.kernel.org/stable/c/f1d5e6a5e468308af7759cf5276779d3155c5e98"
    }
  ],
  "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}
  wid-sec-w-2025-0545
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren und um nicht n\u00e4her beschriebene Auswirkungen zu verursachen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2025-0545 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0545.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2025-0545 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0545"
      },
      {
        "category": "external",
        "summary": "Kernel CVE Announce Mailingliste",
        "url": "https://lore.kernel.org/linux-cve-announce/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58087",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031253-CVE-2024-58087-d9e7@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58088",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031208-CVE-2024-58088-2b01@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2024-58089",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031210-CVE-2024-58089-8e03@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21844",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031210-CVE-2025-21844-a1cc@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21845",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031211-CVE-2025-21845-66d5@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21846",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031211-CVE-2025-21846-25c1@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21847",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031211-CVE-2025-21847-a72f@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21848",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031212-CVE-2025-21848-30e8@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21849",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031212-CVE-2025-21849-c95e@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21850",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031213-CVE-2025-21850-3b06@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21851",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031213-CVE-2025-21851-87bd@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21852",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031213-CVE-2025-21852-b942@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21853",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031214-CVE-2025-21853-cf76@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21854",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031214-CVE-2025-21854-98fb@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21855",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031214-CVE-2025-21855-2d67@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21856",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031215-CVE-2025-21856-8865@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21857",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031215-CVE-2025-21857-ab00@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21858",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031215-CVE-2025-21858-3986@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21859",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031216-CVE-2025-21859-514d@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21860",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031216-CVE-2025-21860-48f9@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21861",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031216-CVE-2025-21861-c775@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21862",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031217-CVE-2025-21862-e8a0@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21863",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031217-CVE-2025-21863-a73a@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21864",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031218-CVE-2025-21864-9a8a@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21865",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031218-CVE-2025-21865-1837@gregkh/"
      },
      {
        "category": "external",
        "summary": "Linux Kernel CVE Announcement CVE-2025-21866",
        "url": "https://lore.kernel.org/linux-cve-announce/2025031218-CVE-2025-21866-11c0@gregkh/"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27",
        "url": "https://ubuntu.com/security/notices/USN-7387-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7382-1 vom 2025-03-27",
        "url": "https://ubuntu.com/security/notices/USN-7382-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7381-1 vom 2025-03-27",
        "url": "https://ubuntu.com/security/notices/USN-7381-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7380-1 vom 2025-03-27",
        "url": "https://ubuntu.com/security/notices/USN-7380-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27",
        "url": "https://ubuntu.com/security/notices/USN-7388-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28",
        "url": "https://ubuntu.com/security/notices/USN-7389-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28",
        "url": "https://ubuntu.com/security/notices/USN-7387-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28",
        "url": "https://ubuntu.com/security/notices/USN-7390-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28",
        "url": "https://ubuntu.com/security/notices/USN-7387-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
        "url": "https://ubuntu.com/security/notices/USN-7407-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07",
        "url": "https://ubuntu.com/security/notices/USN-7421-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
        "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
      },
      {
        "category": "external",
        "summary": "Container-Optimized OS release notes vom 2025-04-16",
        "url": "https://cloud.google.com/container-optimized-os/docs/release-notes#April_14_2025"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-088 vom 2025-04-16",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-088.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24",
        "url": "https://ubuntu.com/security/notices/USN-7459-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24",
        "url": "https://ubuntu.com/security/notices/USN-7458-1"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5907 vom 2025-04-27",
        "url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28",
        "url": "https://ubuntu.com/security/notices/USN-7459-2"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2025-1973 vom 2025-04-30",
        "url": "https://alas.aws.amazon.com/ALAS-2025-1973.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2025-2843 vom 2025-04-30",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2843.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7513-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7515-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7510-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7514-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7516-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7511-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7513-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7511-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7510-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7512-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
        "url": "https://ubuntu.com/security/notices/USN-7517-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7518-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7521-1 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7521-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7510-5"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7522-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7511-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7510-4"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7516-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7523-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7515-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7513-3 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7513-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
        "url": "https://ubuntu.com/security/notices/USN-7510-3"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
        "url": "https://ubuntu.com/security/notices/USN-7517-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
        "url": "https://ubuntu.com/security/notices/USN-7516-4"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
        "url": "https://ubuntu.com/security/notices/USN-7516-5"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7521-2 vom 2025-05-22",
        "url": "https://ubuntu.com/security/notices/USN-7521-2"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
        "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
        "url": "https://ubuntu.com/security/notices/USN-7516-6"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
        "url": "https://ubuntu.com/security/notices/USN-7524-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
        "url": "https://ubuntu.com/security/notices/USN-7517-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
        "url": "https://ubuntu.com/security/notices/USN-7510-6"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
        "url": "https://ubuntu.com/security/notices/USN-7540-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7513-4 vom 2025-05-28",
        "url": "https://ubuntu.com/security/notices/USN-7513-4"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
        "url": "https://ubuntu.com/security/notices/USN-7539-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
        "url": "https://ubuntu.com/security/notices/USN-7510-7"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7521-3 vom 2025-05-28",
        "url": "https://ubuntu.com/security/notices/USN-7521-3"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
        "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
        "url": "https://ubuntu.com/security/notices/USN-7516-7"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
        "url": "https://ubuntu.com/security/notices/USN-7516-8"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
        "url": "https://ubuntu.com/security/notices/USN-7510-8"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-231 vom 2025-05-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-231.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7513-5 vom 2025-05-29",
        "url": "https://ubuntu.com/security/notices/USN-7513-5"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-233 vom 2025-05-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-233.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-232 vom 2025-05-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-232.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
        "url": "https://ubuntu.com/security/notices/USN-7516-9"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
        "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
      },
      {
        "category": "external",
        "summary": "Siemens Security Advisory SSA-082556 vom 2025-06-10",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
        "url": "https://ubuntu.com/security/notices/USN-7593-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
        "url": "https://ubuntu.com/security/notices/USN-7602-1"
      },
      {
        "category": "external",
        "summary": "SEM 2025.2.1 release notes vom 2025-07-02",
        "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
        "url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
        "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
        "url": "https://ubuntu.com/security/notices/USN-7640-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
        "url": "https://ubuntu.com/security/notices/USN-7654-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
        "url": "https://ubuntu.com/security/notices/USN-7654-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
        "url": "https://ubuntu.com/security/notices/USN-7654-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
        "url": "https://ubuntu.com/security/notices/USN-7655-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
        "url": "https://ubuntu.com/security/notices/USN-7654-4"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
        "url": "https://ubuntu.com/security/notices/USN-7654-5"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
        "url": "https://ubuntu.com/security/notices/USN-7686-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7703-1 vom 2025-08-20",
        "url": "https://ubuntu.com/security/notices/USN-7703-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7703-2 vom 2025-08-20",
        "url": "https://ubuntu.com/security/notices/USN-7703-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7703-3 vom 2025-08-21",
        "url": "https://ubuntu.com/security/notices/USN-7703-3"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22",
        "url": "https://ubuntu.com/security/notices/USN-7711-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22",
        "url": "https://ubuntu.com/security/notices/USN-7712-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7719-1 vom 2025-08-26",
        "url": "https://ubuntu.com/security/notices/USN-7719-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7703-4 vom 2025-08-28",
        "url": "https://ubuntu.com/security/notices/USN-7703-4"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02",
        "url": "https://ubuntu.com/security/notices/USN-7712-2"
      }
    ],
    "source_lang": "en-US",
    "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
    "tracking": {
      "current_release_date": "2025-09-02T22:00:00.000+00:00",
      "generator": {
        "date": "2025-09-03T07:16:09.448+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2025-0545",
      "initial_release_date": "2025-03-11T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2025-03-11T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-03-27T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-03-30T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-04-02T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-04-07T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-04-08T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-04-13T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2025-04-15T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-04-16T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-04-24T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-04-27T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2025-04-28T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-04-29T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-05-01T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-05-18T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-05-19T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-05-20T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
        },
        {
          "date": "2025-05-21T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
        },
        {
          "date": "2025-05-22T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-05-26T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von SUSE, Debian und Ubuntu aufgenommen"
        },
        {
          "date": "2025-05-27T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-05-29T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Debian, Ubuntu, SUSE und Amazon aufgenommen"
        },
        {
          "date": "2025-06-02T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-03T22:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-09T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-06-10T22:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Siemens aufgenommen"
        },
        {
          "date": "2025-06-11T22:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-15T22:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-16T22:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-17T22:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-06-23T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-06-26T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-01T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2025-07-08T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
        },
        {
          "date": "2025-07-14T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-15T22:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-07-16T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-17T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-21T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-29T22:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-31T22:00:00.000+00:00",
          "number": "41",
          "summary": "Referenz(en) aufgenommen:"
        },
        {
          "date": "2025-08-05T22:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-19T22:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-20T22:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-21T22:00:00.000+00:00",
          "number": "45",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-24T22:00:00.000+00:00",
          "number": "46",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-26T22:00:00.000+00:00",
          "number": "47",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-27T22:00:00.000+00:00",
          "number": "48",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-28T22:00:00.000+00:00",
          "number": "49",
          "summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
        },
        {
          "date": "2025-09-02T22:00:00.000+00:00",
          "number": "50",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        }
      ],
      "status": "final",
      "version": "50"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Google Container-Optimized OS",
            "product": {
              "name": "Google Container-Optimized OS",
              "product_id": "1607324",
              "product_identification_helper": {
                "cpe": "cpe:/o:google:container-optimized_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Google"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source Linux Kernel",
            "product": {
              "name": "Open Source Linux Kernel",
              "product_id": "T008144",
              "product_identification_helper": {
                "cpe": "cpe:/a:linux:linux_kernel:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "1500 CPU",
                "product": {
                  "name": "Siemens SIMATIC S7 1500 CPU",
                  "product_id": "T025776",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:siemens:simatic_s7:1500_cpu"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c2025.2.1",
                "product": {
                  "name": "SolarWinds Security Event Manager \u003c2025.2.1",
                  "product_id": "T044986"
                }
              },
              {
                "category": "product_version",
                "name": "2025.2.1",
                "product": {
                  "name": "SolarWinds Security Event Manager 2025.2.1",
                  "product_id": "T044986-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Security Event Manager"
          }
        ],
        "category": "vendor",
        "name": "SolarWinds"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-58087",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2024-58087"
    },
    {
      "cve": "CVE-2024-58088",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2024-58088"
    },
    {
      "cve": "CVE-2024-58089",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2024-58089"
    },
    {
      "cve": "CVE-2025-21844",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21844"
    },
    {
      "cve": "CVE-2025-21845",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21845"
    },
    {
      "cve": "CVE-2025-21846",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21846"
    },
    {
      "cve": "CVE-2025-21847",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21847"
    },
    {
      "cve": "CVE-2025-21848",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21848"
    },
    {
      "cve": "CVE-2025-21849",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21849"
    },
    {
      "cve": "CVE-2025-21850",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21850"
    },
    {
      "cve": "CVE-2025-21851",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21851"
    },
    {
      "cve": "CVE-2025-21852",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21852"
    },
    {
      "cve": "CVE-2025-21853",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21853"
    },
    {
      "cve": "CVE-2025-21854",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21854"
    },
    {
      "cve": "CVE-2025-21855",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21855"
    },
    {
      "cve": "CVE-2025-21856",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21856"
    },
    {
      "cve": "CVE-2025-21857",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21857"
    },
    {
      "cve": "CVE-2025-21858",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21858"
    },
    {
      "cve": "CVE-2025-21859",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21859"
    },
    {
      "cve": "CVE-2025-21860",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21860"
    },
    {
      "cve": "CVE-2025-21861",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21861"
    },
    {
      "cve": "CVE-2025-21862",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21862"
    },
    {
      "cve": "CVE-2025-21863",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21863"
    },
    {
      "cve": "CVE-2025-21864",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21864"
    },
    {
      "cve": "CVE-2025-21865",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21865"
    },
    {
      "cve": "CVE-2025-21866",
      "product_status": {
        "known_affected": [
          "T044986",
          "2951",
          "T002207",
          "T000126",
          "398363",
          "T025776",
          "T004914",
          "1607324",
          "T008144"
        ]
      },
      "release_date": "2025-03-11T23:00:00.000+00:00",
      "title": "CVE-2025-21866"
    }
  ]
}
  ghsa-qpwf-m697-v547
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
tcp: drop secpath at the same time as we currently drop dst
Xiumei reported hitting the WARN in xfrm6_tunnel_net_exit while running tests that boil down to: - create a pair of netns - run a basic TCP test over ipcomp6 - delete the pair of netns
The xfrm_state found on spi_byaddr was not deleted at the time we delete the netns, because we still have a reference on it. This lingering reference comes from a secpath (which holds a ref on the xfrm_state), which is still attached to an skb. This skb is not leaked, it ends up on sk_receive_queue and then gets defer-free'd by skb_attempt_defer_free.
The problem happens when we defer freeing an skb (push it on one CPU's defer_list), and don't flush that list before the netns is deleted. In that case, we still have a reference on the xfrm_state that we don't expect at this point.
We already drop the skb's dst in the TCP receive path when it's no longer needed, so let's also drop the secpath. At this point, tcp_filter has already called into the LSM hooks that may require the secpath, so it should not be needed anymore. However, in some of those places, the MPTCP extension has just been attached to the skb, so we cannot simply drop all extensions.
{
  "affected": [],
  "aliases": [
    "CVE-2025-21864"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-476"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-03-12T10:15:19Z",
    "severity": "MODERATE"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: drop secpath at the same time as we currently drop dst\n\nXiumei reported hitting the WARN in xfrm6_tunnel_net_exit while\nrunning tests that boil down to:\n - create a pair of netns\n - run a basic TCP test over ipcomp6\n - delete the pair of netns\n\nThe xfrm_state found on spi_byaddr was not deleted at the time we\ndelete the netns, because we still have a reference on it. This\nlingering reference comes from a secpath (which holds a ref on the\nxfrm_state), which is still attached to an skb. This skb is not\nleaked, it ends up on sk_receive_queue and then gets defer-free\u0027d by\nskb_attempt_defer_free.\n\nThe problem happens when we defer freeing an skb (push it on one CPU\u0027s\ndefer_list), and don\u0027t flush that list before the netns is deleted. In\nthat case, we still have a reference on the xfrm_state that we don\u0027t\nexpect at this point.\n\nWe already drop the skb\u0027s dst in the TCP receive path when it\u0027s no\nlonger needed, so let\u0027s also drop the secpath. At this point,\ntcp_filter has already called into the LSM hooks that may require the\nsecpath, so it should not be needed anymore. However, in some of those\nplaces, the MPTCP extension has just been attached to the skb, so we\ncannot simply drop all extensions.",
  "id": "GHSA-qpwf-m697-v547",
  "modified": "2025-03-13T21:31:18Z",
  "published": "2025-03-12T12:30:59Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21864"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/69cafd9413084cd5012cf5d7c7ec6f3d493726d9"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/87858bbf21da239ace300d61dd209907995c0491"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/9b6412e6979f6f9e0632075f8f008937b5cd4efd"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/cd34a07f744451e2ecf9005bb7d24d0b2fb83656"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/f1d5e6a5e468308af7759cf5276779d3155c5e98"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.