Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-49795 (GCVE-0-2025-49795)
Vulnerability from cvelistv5
- CWE-825 - Expired Pointer Dereference
 
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 | 
                    
                      
                        
                          Unaffected: 0:2.12.5-7.el10_0   < * cpe:/o:redhat:enterprise_linux:10.0  | 
                  |||||||||||||||||||||||||||
                    
  | 
                |||||||||||||||||||||||||||||
{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-49795",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-16T15:30:23.392664Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-16T15:30:39.969Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:10.0"
          ],
          "defaultStatus": "affected",
          "packageName": "libxml2",
          "product": "Red Hat Enterprise Linux 10",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:2.12.5-7.el10_0",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:jboss_core_services:1"
          ],
          "defaultStatus": "unaffected",
          "packageName": "libxml2",
          "product": "Red Hat JBoss Core Services 2.4.62.SP2",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:6"
          ],
          "defaultStatus": "unknown",
          "packageName": "libxml2",
          "product": "Red Hat Enterprise Linux 6",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:7"
          ],
          "defaultStatus": "unaffected",
          "packageName": "libxml2",
          "product": "Red Hat Enterprise Linux 7",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:8"
          ],
          "defaultStatus": "unaffected",
          "packageName": "libxml2",
          "product": "Red Hat Enterprise Linux 8",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:9"
          ],
          "defaultStatus": "unaffected",
          "packageName": "libxml2",
          "product": "Red Hat Enterprise Linux 9",
          "vendor": "Red Hat"
        }
      ],
      "datePublic": "2025-06-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Important"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-825",
              "description": "Expired Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-27T17:46:42.373Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2025:10630",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2025:10630"
        },
        {
          "name": "RHSA-2025:19020",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2025:19020"
        },
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-49795"
        },
        {
          "name": "RHBZ#2372379",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-06-12T00:31:08.194000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-06-11T00:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Libxml: null pointer dereference leads to denial of service (dos)",
      "workarounds": [
        {
          "lang": "en",
          "value": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability."
        }
      ],
      "x_redhatCweChain": "CWE-825: Expired Pointer Dereference"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2025-49795",
    "datePublished": "2025-06-16T15:19:29.871Z",
    "dateReserved": "2025-06-10T22:17:05.286Z",
    "dateUpdated": "2025-10-27T17:46:42.373Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-49795\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-06-16T16:15:19.203\",\"lastModified\":\"2025-10-27T18:15:41.043\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 una vulnerabilidad de desreferencia de puntero nulo en libxml2 al procesar expresiones XML XPath. Esta falla permite a un atacante manipular una entrada XML maliciosa en libxml2, lo que provoca una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-825\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2025:10630\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19020\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-49795\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2372379\",\"source\":\"secalert@redhat.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-49795\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-16T15:30:23.392664Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-16T15:30:31.217Z\"}}], \"cna\": {\"title\": \"Libxml: null pointer dereference leads to denial of service (dos)\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.0\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.12.5-7.el10_0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:jboss_core_services:1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat JBoss Core Services 2.4.62.SP2\", \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-06-12T00:31:08.194000+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-06-11T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-06-11T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2025:10630\", \"name\": \"RHSA-2025:10630\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:19020\", \"name\": \"RHSA-2025:19020\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-49795\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2372379\", \"name\": \"RHBZ#2372379\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-825\", \"description\": \"Expired Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-10-27T17:46:42.373Z\"}, \"x_redhatCweChain\": \"CWE-825: Expired Pointer Dereference\"}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-49795\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-27T17:46:42.373Z\", \"dateReserved\": \"2025-06-10T22:17:05.286Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-06-16T15:19:29.871Z\", \"assignerShortName\": \"redhat\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | 
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
      "product": {
        "name": "Tanzu Operations Manager",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-44832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
    },
    {
      "name": "CVE-2021-45105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
    },
    {
      "name": "CVE-2021-44228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
    },
    {
      "name": "CVE-2013-1548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
    },
    {
      "name": "CVE-2015-4779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
    },
    {
      "name": "CVE-2015-4780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
    },
    {
      "name": "CVE-2015-4787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
    },
    {
      "name": "CVE-2015-4790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
    },
    {
      "name": "CVE-2015-4778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
    },
    {
      "name": "CVE-2015-4782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
    },
    {
      "name": "CVE-2015-4789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
    },
    {
      "name": "CVE-2015-4764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
    },
    {
      "name": "CVE-2015-4783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
    },
    {
      "name": "CVE-2015-2583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
    },
    {
      "name": "CVE-2015-4781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
    },
    {
      "name": "CVE-2015-4776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
    },
    {
      "name": "CVE-2015-4786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
    },
    {
      "name": "CVE-2015-2656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
    },
    {
      "name": "CVE-2015-4788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
    },
    {
      "name": "CVE-2015-4785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
    },
    {
      "name": "CVE-2015-4754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
    },
    {
      "name": "CVE-2015-4775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
    },
    {
      "name": "CVE-2015-4777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
    },
    {
      "name": "CVE-2015-2640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
    },
    {
      "name": "CVE-2015-4774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
    },
    {
      "name": "CVE-2015-2626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
    },
    {
      "name": "CVE-2015-2624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
    },
    {
      "name": "CVE-2015-4784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
    },
    {
      "name": "CVE-2015-2654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
    },
    {
      "name": "CVE-2017-8046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
    },
    {
      "name": "CVE-2018-3280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
    },
    {
      "name": "CVE-2018-3137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
    },
    {
      "name": "CVE-2018-3285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
    },
    {
      "name": "CVE-2018-3182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
    },
    {
      "name": "CVE-2018-3186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
    },
    {
      "name": "CVE-2018-3195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
    },
    {
      "name": "CVE-2018-3286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
    },
    {
      "name": "CVE-2018-3170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
    },
    {
      "name": "CVE-2018-3279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
    },
    {
      "name": "CVE-2018-3212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
    },
    {
      "name": "CVE-2018-3203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
    },
    {
      "name": "CVE-2018-3145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
    },
    {
      "name": "CVE-2019-2530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
    },
    {
      "name": "CVE-2019-2436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
    },
    {
      "name": "CVE-2019-2539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
    },
    {
      "name": "CVE-2019-2494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
    },
    {
      "name": "CVE-2019-2535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
    },
    {
      "name": "CVE-2019-2533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
    },
    {
      "name": "CVE-2019-2495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
    },
    {
      "name": "CVE-2019-2513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
    },
    {
      "name": "CVE-2019-2536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
    },
    {
      "name": "CVE-2019-2502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
    },
    {
      "name": "CVE-2019-2634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
    },
    {
      "name": "CVE-2019-2587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
    },
    {
      "name": "CVE-2019-2584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
    },
    {
      "name": "CVE-2019-2691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
    },
    {
      "name": "CVE-2019-2606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
    },
    {
      "name": "CVE-2019-2630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
    },
    {
      "name": "CVE-2019-2624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
    },
    {
      "name": "CVE-2019-2623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
    },
    {
      "name": "CVE-2019-2695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
    },
    {
      "name": "CVE-2019-2596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
    },
    {
      "name": "CVE-2019-2580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
    },
    {
      "name": "CVE-2019-2644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
    },
    {
      "name": "CVE-2019-2681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
    },
    {
      "name": "CVE-2019-2617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
    },
    {
      "name": "CVE-2019-2636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
    },
    {
      "name": "CVE-2019-2689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
    },
    {
      "name": "CVE-2019-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
    },
    {
      "name": "CVE-2019-2593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
    },
    {
      "name": "CVE-2019-2625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
    },
    {
      "name": "CVE-2019-2585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
    },
    {
      "name": "CVE-2019-2631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
    },
    {
      "name": "CVE-2019-2694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
    },
    {
      "name": "CVE-2019-2620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
    },
    {
      "name": "CVE-2019-2688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
    },
    {
      "name": "CVE-2019-2589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
    },
    {
      "name": "CVE-2019-2635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
    },
    {
      "name": "CVE-2019-2626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
    },
    {
      "name": "CVE-2019-2686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
    },
    {
      "name": "CVE-2019-2685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
    },
    {
      "name": "CVE-2019-2687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
    },
    {
      "name": "CVE-2019-2607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
    },
    {
      "name": "CVE-2019-7317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
    },
    {
      "name": "CVE-2019-2811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
    },
    {
      "name": "CVE-2019-2740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
    },
    {
      "name": "CVE-2019-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
    },
    {
      "name": "CVE-2019-2808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
    },
    {
      "name": "CVE-2019-2738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
    },
    {
      "name": "CVE-2019-2819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
    },
    {
      "name": "CVE-2019-2737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
    },
    {
      "name": "CVE-2019-2814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
    },
    {
      "name": "CVE-2019-2778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
    },
    {
      "name": "CVE-2019-2822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
    },
    {
      "name": "CVE-2019-2802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
    },
    {
      "name": "CVE-2019-2803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
    },
    {
      "name": "CVE-2019-2752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
    },
    {
      "name": "CVE-2019-2826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
    },
    {
      "name": "CVE-2019-2784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
    },
    {
      "name": "CVE-2019-2789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
    },
    {
      "name": "CVE-2019-2801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
    },
    {
      "name": "CVE-2019-2791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
    },
    {
      "name": "CVE-2019-2798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
    },
    {
      "name": "CVE-2019-2796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
    },
    {
      "name": "CVE-2019-2815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
    },
    {
      "name": "CVE-2019-2810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
    },
    {
      "name": "CVE-2019-2780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
    },
    {
      "name": "CVE-2019-2758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
    },
    {
      "name": "CVE-2019-2757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
    },
    {
      "name": "CVE-2019-2785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
    },
    {
      "name": "CVE-2019-2747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
    },
    {
      "name": "CVE-2019-2741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
    },
    {
      "name": "CVE-2019-2830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
    },
    {
      "name": "CVE-2019-2834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
    },
    {
      "name": "CVE-2019-2743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
    },
    {
      "name": "CVE-2019-2739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
    },
    {
      "name": "CVE-2019-2805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
    },
    {
      "name": "CVE-2019-2797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
    },
    {
      "name": "CVE-2019-2774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
    },
    {
      "name": "CVE-2019-2795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
    },
    {
      "name": "CVE-2019-2746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
    },
    {
      "name": "CVE-2019-2812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
    },
    {
      "name": "CVE-2019-2924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
    },
    {
      "name": "CVE-2019-2914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
    },
    {
      "name": "CVE-2019-2960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
    },
    {
      "name": "CVE-2019-2923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
    },
    {
      "name": "CVE-2019-2968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
    },
    {
      "name": "CVE-2019-2993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
    },
    {
      "name": "CVE-2019-3009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
    },
    {
      "name": "CVE-2019-2969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
    },
    {
      "name": "CVE-2019-3011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
    },
    {
      "name": "CVE-2019-2967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
    },
    {
      "name": "CVE-2019-2946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
    },
    {
      "name": "CVE-2019-2966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
    },
    {
      "name": "CVE-2019-2957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
    },
    {
      "name": "CVE-2019-2948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
    },
    {
      "name": "CVE-2019-2922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
    },
    {
      "name": "CVE-2019-3004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
    },
    {
      "name": "CVE-2019-2998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
    },
    {
      "name": "CVE-2019-2911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
    },
    {
      "name": "CVE-2019-2950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
    },
    {
      "name": "CVE-2019-2910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
    },
    {
      "name": "CVE-2019-3018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
    },
    {
      "name": "CVE-2019-2974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
    },
    {
      "name": "CVE-2019-2991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
    },
    {
      "name": "CVE-2019-2997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
    },
    {
      "name": "CVE-2019-2938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
    },
    {
      "name": "CVE-2019-3003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
    },
    {
      "name": "CVE-2019-2982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
    },
    {
      "name": "CVE-2019-2963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
    },
    {
      "name": "CVE-2020-2579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
    },
    {
      "name": "CVE-2020-2584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
    },
    {
      "name": "CVE-2020-2577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
    },
    {
      "name": "CVE-2020-2679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
    },
    {
      "name": "CVE-2020-2570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
    },
    {
      "name": "CVE-2020-2572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
    },
    {
      "name": "CVE-2020-2627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
    },
    {
      "name": "CVE-2020-2660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
    },
    {
      "name": "CVE-2020-2589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
    },
    {
      "name": "CVE-2020-2573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
    },
    {
      "name": "CVE-2020-2686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
    },
    {
      "name": "CVE-2020-2694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
    },
    {
      "name": "CVE-2020-2574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
    },
    {
      "name": "CVE-2020-2770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
    },
    {
      "name": "CVE-2020-2925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
    },
    {
      "name": "CVE-2020-2853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
    },
    {
      "name": "CVE-2020-2774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
    },
    {
      "name": "CVE-2020-2928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
    },
    {
      "name": "CVE-2020-2897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
    },
    {
      "name": "CVE-2020-2812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
    },
    {
      "name": "CVE-2020-2765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
    },
    {
      "name": "CVE-2020-2761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
    },
    {
      "name": "CVE-2020-2790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
    },
    {
      "name": "CVE-2020-2752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
    },
    {
      "name": "CVE-2020-2904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
    },
    {
      "name": "CVE-2020-2893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
    },
    {
      "name": "CVE-2020-2760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
    },
    {
      "name": "CVE-2020-2780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
    },
    {
      "name": "CVE-2020-2903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
    },
    {
      "name": "CVE-2020-2924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
    },
    {
      "name": "CVE-2020-2806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
    },
    {
      "name": "CVE-2020-2922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
    },
    {
      "name": "CVE-2020-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
    },
    {
      "name": "CVE-2020-2926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
    },
    {
      "name": "CVE-2020-2923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
    },
    {
      "name": "CVE-2020-2921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
    },
    {
      "name": "CVE-2020-2779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
    },
    {
      "name": "CVE-2020-2892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
    },
    {
      "name": "CVE-2020-2896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
    },
    {
      "name": "CVE-2020-2804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
    },
    {
      "name": "CVE-2020-2895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
    },
    {
      "name": "CVE-2020-2930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
    },
    {
      "name": "CVE-2020-2814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
    },
    {
      "name": "CVE-2020-2759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
    },
    {
      "name": "CVE-2020-2763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
    },
    {
      "name": "CVE-2020-14550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
    },
    {
      "name": "CVE-2020-14567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
    },
    {
      "name": "CVE-2020-14559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
    },
    {
      "name": "CVE-2020-14576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
    },
    {
      "name": "CVE-2020-14540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
    },
    {
      "name": "CVE-2020-14547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
    },
    {
      "name": "CVE-2020-14553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
    },
    {
      "name": "CVE-2020-14539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
    },
    {
      "name": "CVE-2020-14845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
    },
    {
      "name": "CVE-2020-14799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
    },
    {
      "name": "CVE-2020-14793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
    },
    {
      "name": "CVE-2020-14888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
    },
    {
      "name": "CVE-2020-14790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
    },
    {
      "name": "CVE-2020-14789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
    },
    {
      "name": "CVE-2020-14672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
    },
    {
      "name": "CVE-2020-14846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
    },
    {
      "name": "CVE-2020-14771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
    },
    {
      "name": "CVE-2020-14873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
    },
    {
      "name": "CVE-2020-14791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
    },
    {
      "name": "CVE-2020-14769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
    },
    {
      "name": "CVE-2020-14844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
    },
    {
      "name": "CVE-2020-14809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
    },
    {
      "name": "CVE-2020-14860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
    },
    {
      "name": "CVE-2020-14866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
    },
    {
      "name": "CVE-2020-14861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
    },
    {
      "name": "CVE-2020-14773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
    },
    {
      "name": "CVE-2020-14776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
    },
    {
      "name": "CVE-2020-14852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
    },
    {
      "name": "CVE-2020-14760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
    },
    {
      "name": "CVE-2020-14870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
    },
    {
      "name": "CVE-2020-14837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
    },
    {
      "name": "CVE-2020-14893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
    },
    {
      "name": "CVE-2020-14836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
    },
    {
      "name": "CVE-2020-14829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
    },
    {
      "name": "CVE-2020-14868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
    },
    {
      "name": "CVE-2020-14827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
    },
    {
      "name": "CVE-2020-14839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
    },
    {
      "name": "CVE-2020-14777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
    },
    {
      "name": "CVE-2020-14812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
    },
    {
      "name": "CVE-2020-14775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
    },
    {
      "name": "CVE-2020-14838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
    },
    {
      "name": "CVE-2020-14869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
    },
    {
      "name": "CVE-2020-14765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
    },
    {
      "name": "CVE-2020-14814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
    },
    {
      "name": "CVE-2020-14821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
    },
    {
      "name": "CVE-2020-14830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
    },
    {
      "name": "CVE-2020-14828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
    },
    {
      "name": "CVE-2020-14804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
    },
    {
      "name": "CVE-2020-14800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
    },
    {
      "name": "CVE-2020-14891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
    },
    {
      "name": "CVE-2020-14848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
    },
    {
      "name": "CVE-2020-14867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
    },
    {
      "name": "CVE-2020-14785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
    },
    {
      "name": "CVE-2020-14794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
    },
    {
      "name": "CVE-2020-14786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
    },
    {
      "name": "CVE-2020-15358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2021-2010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
    },
    {
      "name": "CVE-2021-2001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
    },
    {
      "name": "CVE-2021-2060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
    },
    {
      "name": "CVE-2021-2014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
    },
    {
      "name": "CVE-2021-2032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
    },
    {
      "name": "CVE-2021-2036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
    },
    {
      "name": "CVE-2021-2007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
    },
    {
      "name": "CVE-2021-2011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
    },
    {
      "name": "CVE-2021-2022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
    },
    {
      "name": "CVE-2019-25013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
    },
    {
      "name": "CVE-2021-2308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
    },
    {
      "name": "CVE-2021-2213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
    },
    {
      "name": "CVE-2021-2172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
    },
    {
      "name": "CVE-2021-2293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
    },
    {
      "name": "CVE-2021-2208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
    },
    {
      "name": "CVE-2021-2196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
    },
    {
      "name": "CVE-2021-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
    },
    {
      "name": "CVE-2021-2298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
    },
    {
      "name": "CVE-2021-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
    },
    {
      "name": "CVE-2021-2179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
    },
    {
      "name": "CVE-2021-2307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
    },
    {
      "name": "CVE-2021-2217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
    },
    {
      "name": "CVE-2021-2180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
    },
    {
      "name": "CVE-2021-2203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
    },
    {
      "name": "CVE-2021-2144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
    },
    {
      "name": "CVE-2021-2226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
    },
    {
      "name": "CVE-2021-2232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
    },
    {
      "name": "CVE-2021-2169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
    },
    {
      "name": "CVE-2021-2301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
    },
    {
      "name": "CVE-2021-2202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
    },
    {
      "name": "CVE-2021-2166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
    },
    {
      "name": "CVE-2021-2174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
    },
    {
      "name": "CVE-2021-2154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
    },
    {
      "name": "CVE-2021-2193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
    },
    {
      "name": "CVE-2021-2300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
    },
    {
      "name": "CVE-2021-2299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
    },
    {
      "name": "CVE-2021-2212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
    },
    {
      "name": "CVE-2021-2178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
    },
    {
      "name": "CVE-2021-2146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
    },
    {
      "name": "CVE-2021-2230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
    },
    {
      "name": "CVE-2021-2278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
    },
    {
      "name": "CVE-2021-2164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
    },
    {
      "name": "CVE-2021-2201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
    },
    {
      "name": "CVE-2021-2170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
    },
    {
      "name": "CVE-2021-2304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
    },
    {
      "name": "CVE-2021-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
    },
    {
      "name": "CVE-2021-2171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
    },
    {
      "name": "CVE-2021-2305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
    },
    {
      "name": "CVE-2021-2215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
    },
    {
      "name": "CVE-2021-25214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
    },
    {
      "name": "CVE-2012-6153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
    },
    {
      "name": "CVE-2020-10878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
    },
    {
      "name": "CVE-2021-2370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2021-2444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
    },
    {
      "name": "CVE-2021-2429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
    },
    {
      "name": "CVE-2021-2426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
    },
    {
      "name": "CVE-2021-2427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
    },
    {
      "name": "CVE-2021-2339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
    },
    {
      "name": "CVE-2021-2425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
    },
    {
      "name": "CVE-2021-2387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
    },
    {
      "name": "CVE-2021-2383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2021-2399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
    },
    {
      "name": "CVE-2021-2384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
    },
    {
      "name": "CVE-2021-2412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
    },
    {
      "name": "CVE-2021-2441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
    },
    {
      "name": "CVE-2021-2410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2021-2437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
    },
    {
      "name": "CVE-2021-2417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
    },
    {
      "name": "CVE-2021-2424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2021-2357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
    },
    {
      "name": "CVE-2021-2352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
    },
    {
      "name": "CVE-2021-2402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
    },
    {
      "name": "CVE-2021-2440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
    },
    {
      "name": "CVE-2021-2340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2021-2374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
    },
    {
      "name": "CVE-2021-2356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
    },
    {
      "name": "CVE-2021-2411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
    },
    {
      "name": "CVE-2021-2418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
    },
    {
      "name": "CVE-2021-2367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
    },
    {
      "name": "CVE-2021-2354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
    },
    {
      "name": "CVE-2021-2422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
    },
    {
      "name": "CVE-2020-10543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
    },
    {
      "name": "CVE-2020-12723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
    },
    {
      "name": "CVE-2020-10029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
    },
    {
      "name": "CVE-2021-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
    },
    {
      "name": "CVE-2020-28500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
    },
    {
      "name": "CVE-2019-18276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
    },
    {
      "name": "CVE-2021-3421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
    },
    {
      "name": "CVE-2021-3326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
    },
    {
      "name": "CVE-2019-2708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
    },
    {
      "name": "CVE-2020-27618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
    },
    {
      "name": "CVE-2021-35640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
    },
    {
      "name": "CVE-2021-35626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
    },
    {
      "name": "CVE-2021-2478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
    },
    {
      "name": "CVE-2021-35624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
    },
    {
      "name": "CVE-2021-35583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
    },
    {
      "name": "CVE-2021-35628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
    },
    {
      "name": "CVE-2021-35630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
    },
    {
      "name": "CVE-2021-35644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
    },
    {
      "name": "CVE-2021-2479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
    },
    {
      "name": "CVE-2021-35638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
    },
    {
      "name": "CVE-2021-35646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
    },
    {
      "name": "CVE-2021-35596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
    },
    {
      "name": "CVE-2021-35643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
    },
    {
      "name": "CVE-2021-35637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
    },
    {
      "name": "CVE-2021-35623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
    },
    {
      "name": "CVE-2021-35632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
    },
    {
      "name": "CVE-2021-35641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
    },
    {
      "name": "CVE-2021-35604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
    },
    {
      "name": "CVE-2021-35636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
    },
    {
      "name": "CVE-2021-35546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
    },
    {
      "name": "CVE-2021-35627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
    },
    {
      "name": "CVE-2021-35625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
    },
    {
      "name": "CVE-2021-35608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
    },
    {
      "name": "CVE-2021-35597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
    },
    {
      "name": "CVE-2021-35537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
    },
    {
      "name": "CVE-2021-2481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
    },
    {
      "name": "CVE-2021-35622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
    },
    {
      "name": "CVE-2021-35610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
    },
    {
      "name": "CVE-2021-35633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
    },
    {
      "name": "CVE-2021-35634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
    },
    {
      "name": "CVE-2021-35629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
    },
    {
      "name": "CVE-2021-35631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
    },
    {
      "name": "CVE-2021-35645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
    },
    {
      "name": "CVE-2021-35647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
    },
    {
      "name": "CVE-2021-35612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
    },
    {
      "name": "CVE-2021-35639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
    },
    {
      "name": "CVE-2021-35648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
    },
    {
      "name": "CVE-2021-35607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
    },
    {
      "name": "CVE-2021-35602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
    },
    {
      "name": "CVE-2021-35577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
    },
    {
      "name": "CVE-2021-35642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
    },
    {
      "name": "CVE-2021-35575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
    },
    {
      "name": "CVE-2021-35635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
    },
    {
      "name": "CVE-2021-35591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
    },
    {
      "name": "CVE-2021-25219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
    },
    {
      "name": "CVE-2021-3875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
    },
    {
      "name": "CVE-2019-10744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
    },
    {
      "name": "CVE-2022-21352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
    },
    {
      "name": "CVE-2022-21304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
    },
    {
      "name": "CVE-2022-21254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
    },
    {
      "name": "CVE-2022-21265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
    },
    {
      "name": "CVE-2022-21348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
    },
    {
      "name": "CVE-2022-21372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
    },
    {
      "name": "CVE-2022-21245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
    },
    {
      "name": "CVE-2022-21368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
    },
    {
      "name": "CVE-2022-21339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
    },
    {
      "name": "CVE-2022-21264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
    },
    {
      "name": "CVE-2022-21297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
    },
    {
      "name": "CVE-2022-21379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
    },
    {
      "name": "CVE-2022-21253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
    },
    {
      "name": "CVE-2022-21301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
    },
    {
      "name": "CVE-2022-21378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
    },
    {
      "name": "CVE-2022-21370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
    },
    {
      "name": "CVE-2022-21302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
    },
    {
      "name": "CVE-2022-21249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
    },
    {
      "name": "CVE-2022-21344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
    },
    {
      "name": "CVE-2022-21270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
    },
    {
      "name": "CVE-2022-21367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
    },
    {
      "name": "CVE-2022-21342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
    },
    {
      "name": "CVE-2022-21362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
    },
    {
      "name": "CVE-2022-21303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
    },
    {
      "name": "CVE-2022-21256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
    },
    {
      "name": "CVE-2022-21358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
    },
    {
      "name": "CVE-2022-21374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
    },
    {
      "name": "CVE-2022-3602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
    },
    {
      "name": "CVE-2022-2309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
    },
    {
      "name": "CVE-2022-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
    },
    {
      "name": "CVE-2022-35737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
    },
    {
      "name": "CVE-2022-40303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
    },
    {
      "name": "CVE-2022-40304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
    },
    {
      "name": "CVE-2020-8203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
    },
    {
      "name": "CVE-2022-3786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
    },
    {
      "name": "CVE-2022-2795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
    },
    {
      "name": "CVE-2022-34903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
    },
    {
      "name": "CVE-2022-3515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
    },
    {
      "name": "CVE-2022-3996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2021-4193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
    },
    {
      "name": "CVE-2020-15366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
    },
    {
      "name": "CVE-2022-22965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
    },
    {
      "name": "CVE-2022-0213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
    },
    {
      "name": "CVE-2022-21418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
    },
    {
      "name": "CVE-2022-21412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
    },
    {
      "name": "CVE-2022-21437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
    },
    {
      "name": "CVE-2022-21478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
    },
    {
      "name": "CVE-2022-21479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
    },
    {
      "name": "CVE-2022-21438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
    },
    {
      "name": "CVE-2022-21440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
    },
    {
      "name": "CVE-2022-21451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
    },
    {
      "name": "CVE-2022-21427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
    },
    {
      "name": "CVE-2022-21415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
    },
    {
      "name": "CVE-2022-21459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
    },
    {
      "name": "CVE-2022-21460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
    },
    {
      "name": "CVE-2022-21414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
    },
    {
      "name": "CVE-2022-21413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
    },
    {
      "name": "CVE-2022-21436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
    },
    {
      "name": "CVE-2022-21435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
    },
    {
      "name": "CVE-2022-21462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
    },
    {
      "name": "CVE-2022-21444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
    },
    {
      "name": "CVE-2022-21417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
    },
    {
      "name": "CVE-2022-21457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
    },
    {
      "name": "CVE-2022-21425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
    },
    {
      "name": "CVE-2022-21452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
    },
    {
      "name": "CVE-2021-20266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2021-3521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
    },
    {
      "name": "CVE-2021-4122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
    },
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2017-7500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
    },
    {
      "name": "CVE-2021-33574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
    },
    {
      "name": "CVE-2017-11164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
    },
    {
      "name": "CVE-2022-21525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
    },
    {
      "name": "CVE-2022-21537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
    },
    {
      "name": "CVE-2022-21455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
    },
    {
      "name": "CVE-2022-21534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
    },
    {
      "name": "CVE-2022-21528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
    },
    {
      "name": "CVE-2022-21529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
    },
    {
      "name": "CVE-2022-21531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
    },
    {
      "name": "CVE-2022-21515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
    },
    {
      "name": "CVE-2022-21538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
    },
    {
      "name": "CVE-2022-21527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
    },
    {
      "name": "CVE-2022-21517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
    },
    {
      "name": "CVE-2022-21539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
    },
    {
      "name": "CVE-2022-21556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
    },
    {
      "name": "CVE-2022-21509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
    },
    {
      "name": "CVE-2022-21553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
    },
    {
      "name": "CVE-2022-21530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
    },
    {
      "name": "CVE-2022-21522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
    },
    {
      "name": "CVE-2022-21547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
    },
    {
      "name": "CVE-2022-21569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
    },
    {
      "name": "CVE-2022-21526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
    },
    {
      "name": "CVE-2021-3999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
    },
    {
      "name": "CVE-2022-23218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
    },
    {
      "name": "CVE-2022-23219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2021-25220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
    },
    {
      "name": "CVE-2022-0396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
    },
    {
      "name": "CVE-2022-3358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2012-5783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
    },
    {
      "name": "CVE-2022-21592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
    },
    {
      "name": "CVE-2022-21617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
    },
    {
      "name": "CVE-2022-21595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
    },
    {
      "name": "CVE-2022-21608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
    },
    {
      "name": "CVE-2022-21589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
    },
    {
      "name": "CVE-2023-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
    },
    {
      "name": "CVE-2023-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
    },
    {
      "name": "CVE-2023-21879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
    },
    {
      "name": "CVE-2023-21880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
    },
    {
      "name": "CVE-2023-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
    },
    {
      "name": "CVE-2023-21872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
    },
    {
      "name": "CVE-2023-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
    },
    {
      "name": "CVE-2023-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
    },
    {
      "name": "CVE-2023-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
    },
    {
      "name": "CVE-2023-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
    },
    {
      "name": "CVE-2023-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
    },
    {
      "name": "CVE-2023-21876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
    },
    {
      "name": "CVE-2023-21840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
    },
    {
      "name": "CVE-2023-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
    },
    {
      "name": "CVE-2023-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
    },
    {
      "name": "CVE-2023-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
    },
    {
      "name": "CVE-2023-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
    },
    {
      "name": "CVE-2023-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
    },
    {
      "name": "CVE-2023-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
    },
    {
      "name": "CVE-2023-21874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
    },
    {
      "name": "CVE-2023-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-0401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
    },
    {
      "name": "CVE-2023-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2022-4415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2023-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
    },
    {
      "name": "CVE-2023-21977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
    },
    {
      "name": "CVE-2023-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
    },
    {
      "name": "CVE-2023-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
    },
    {
      "name": "CVE-2023-28484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
    },
    {
      "name": "CVE-2023-20873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
    },
    {
      "name": "CVE-2023-20883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
    },
    {
      "name": "CVE-2023-27535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
    },
    {
      "name": "CVE-2023-27538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
    },
    {
      "name": "CVE-2023-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
    },
    {
      "name": "CVE-2023-27537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
    },
    {
      "name": "CVE-2020-1752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
    },
    {
      "name": "CVE-2021-35942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
    },
    {
      "name": "CVE-2021-38604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
    },
    {
      "name": "CVE-2020-29562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
    },
    {
      "name": "CVE-2021-27645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2022-46908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
    },
    {
      "name": "CVE-2023-28320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
    },
    {
      "name": "CVE-2023-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
    },
    {
      "name": "CVE-2023-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
    },
    {
      "name": "CVE-2023-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
    },
    {
      "name": "CVE-2022-4899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
    },
    {
      "name": "CVE-2022-25883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
    },
    {
      "name": "CVE-2023-40403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
    },
    {
      "name": "CVE-2023-4911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2016-1000027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
    },
    {
      "name": "CVE-2023-35116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
    },
    {
      "name": "CVE-2023-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
    },
    {
      "name": "CVE-2023-22084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
    },
    {
      "name": "CVE-2023-22026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
    },
    {
      "name": "CVE-2023-22028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
    },
    {
      "name": "CVE-2023-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
    },
    {
      "name": "CVE-2023-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
    },
    {
      "name": "CVE-2023-22068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
    },
    {
      "name": "CVE-2023-22078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-22059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
    },
    {
      "name": "CVE-2023-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
    },
    {
      "name": "CVE-2023-22114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
    },
    {
      "name": "CVE-2023-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
    },
    {
      "name": "CVE-2023-22032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-45853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-40217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2021-22570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
    },
    {
      "name": "CVE-2023-2603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
    },
    {
      "name": "CVE-2023-2602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
    },
    {
      "name": "CVE-2023-4527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2022-48303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
    },
    {
      "name": "CVE-2023-34055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
    },
    {
      "name": "CVE-2023-4039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
    },
    {
      "name": "CVE-2022-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
    },
    {
      "name": "CVE-2023-0687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2022-48522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
    },
    {
      "name": "CVE-2023-39615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2021-33294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
    },
    {
      "name": "CVE-2021-43618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
    },
    {
      "name": "CVE-2023-45322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
    },
    {
      "name": "CVE-2022-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
    },
    {
      "name": "CVE-2023-4016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
    },
    {
      "name": "CVE-2013-4235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
    },
    {
      "name": "CVE-2023-34969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
    },
    {
      "name": "CVE-2021-20193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
    },
    {
      "name": "CVE-2023-29383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
    },
    {
      "name": "CVE-2023-5981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
    },
    {
      "name": "CVE-2023-36054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
    },
    {
      "name": "CVE-2023-7104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-46219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-47100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
    },
    {
      "name": "CVE-2023-47038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2022-27772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2023-6481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
    },
    {
      "name": "CVE-2023-36632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
    },
    {
      "name": "CVE-2024-28085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2020-22916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
    },
    {
      "name": "CVE-2016-2781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
    },
    {
      "name": "CVE-2023-3978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
    },
    {
      "name": "CVE-2017-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
    },
    {
      "name": "CVE-2021-35939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
    },
    {
      "name": "CVE-2024-0553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
    },
    {
      "name": "CVE-2021-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
    },
    {
      "name": "CVE-2021-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2023-52572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
    },
    {
      "name": "CVE-2007-4559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
    },
    {
      "name": "CVE-2023-3138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2023-6378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
    },
    {
      "name": "CVE-2023-31486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
    },
    {
      "name": "CVE-2024-26739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2023-51074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
    },
    {
      "name": "CVE-2023-52757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2024-35867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
    },
    {
      "name": "CVE-2024-35943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-0397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
    },
    {
      "name": "CVE-2024-4030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-36945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
    },
    {
      "name": "CVE-2024-38540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2023-4641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
    },
    {
      "name": "CVE-2024-0567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2024-21137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
    },
    {
      "name": "CVE-2024-0760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
    },
    {
      "name": "CVE-2024-1737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
    },
    {
      "name": "CVE-2024-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
    },
    {
      "name": "CVE-2024-28835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    },
    {
      "name": "CVE-2024-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
    },
    {
      "name": "CVE-2024-36908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
    },
    {
      "name": "CVE-2024-27402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2024-38808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
    },
    {
      "name": "CVE-2024-38809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
    },
    {
      "name": "CVE-2024-42230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
    },
    {
      "name": "CVE-2024-38807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
    },
    {
      "name": "CVE-2024-6232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2022-48893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2023-5841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
    },
    {
      "name": "CVE-2024-34459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2023-6246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
    },
    {
      "name": "CVE-2024-46812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
    },
    {
      "name": "CVE-2024-46821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2024-46753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
    },
    {
      "name": "CVE-2024-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2022-21454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
    },
    {
      "name": "CVE-2024-21193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
    },
    {
      "name": "CVE-2024-21194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
    },
    {
      "name": "CVE-2024-21196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
    },
    {
      "name": "CVE-2024-21197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
    },
    {
      "name": "CVE-2024-21198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
    },
    {
      "name": "CVE-2024-21199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
    },
    {
      "name": "CVE-2024-21201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
    },
    {
      "name": "CVE-2024-21207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
    },
    {
      "name": "CVE-2024-21209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
    },
    {
      "name": "CVE-2024-21212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
    },
    {
      "name": "CVE-2024-21213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
    },
    {
      "name": "CVE-2024-21219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
    },
    {
      "name": "CVE-2024-21236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
    },
    {
      "name": "CVE-2024-21239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
    },
    {
      "name": "CVE-2024-21241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2024-38820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
    },
    {
      "name": "CVE-2024-10487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
    },
    {
      "name": "CVE-2024-10458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
    },
    {
      "name": "CVE-2024-10459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
    },
    {
      "name": "CVE-2024-10460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
    },
    {
      "name": "CVE-2024-10461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
    },
    {
      "name": "CVE-2024-10462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
    },
    {
      "name": "CVE-2024-10463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
    },
    {
      "name": "CVE-2024-10464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
    },
    {
      "name": "CVE-2024-10465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
    },
    {
      "name": "CVE-2024-10466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
    },
    {
      "name": "CVE-2024-10467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
    },
    {
      "name": "CVE-2024-10468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-38286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
    },
    {
      "name": "CVE-2024-7592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
    },
    {
      "name": "CVE-2024-8088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
    },
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2024-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
    },
    {
      "name": "CVE-2024-38828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
    },
    {
      "name": "CVE-2024-46816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
    },
    {
      "name": "CVE-2024-11395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
    },
    {
      "name": "CVE-2024-49960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2024-11691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
    },
    {
      "name": "CVE-2024-11692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
    },
    {
      "name": "CVE-2024-11693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
    },
    {
      "name": "CVE-2024-11694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
    },
    {
      "name": "CVE-2024-11695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
    },
    {
      "name": "CVE-2024-11696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
    },
    {
      "name": "CVE-2024-11697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
    },
    {
      "name": "CVE-2024-11698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
    },
    {
      "name": "CVE-2024-11699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
    },
    {
      "name": "CVE-2024-11700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
    },
    {
      "name": "CVE-2024-11701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
    },
    {
      "name": "CVE-2024-11702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
    },
    {
      "name": "CVE-2024-11703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
    },
    {
      "name": "CVE-2024-11704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
    },
    {
      "name": "CVE-2024-11705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
    },
    {
      "name": "CVE-2024-11706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
    },
    {
      "name": "CVE-2024-11708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
    },
    {
      "name": "CVE-2024-50272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2024-10041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
    },
    {
      "name": "CVE-2024-10963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
    },
    {
      "name": "CVE-2024-47554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
    },
    {
      "name": "CVE-2024-49989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
    },
    {
      "name": "CVE-2024-50125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2024-53144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
    },
    {
      "name": "CVE-2024-8805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
    },
    {
      "name": "CVE-2025-0237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
    },
    {
      "name": "CVE-2025-0238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
    },
    {
      "name": "CVE-2025-0239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
    },
    {
      "name": "CVE-2025-0240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
    },
    {
      "name": "CVE-2025-0241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
    },
    {
      "name": "CVE-2025-0242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
    },
    {
      "name": "CVE-2025-0243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
    },
    {
      "name": "CVE-2025-0245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
    },
    {
      "name": "CVE-2025-0247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
    },
    {
      "name": "CVE-2025-0434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
    },
    {
      "name": "CVE-2025-0435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
    },
    {
      "name": "CVE-2025-0436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
    },
    {
      "name": "CVE-2025-0437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
    },
    {
      "name": "CVE-2025-0438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
    },
    {
      "name": "CVE-2025-0439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
    },
    {
      "name": "CVE-2025-0440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
    },
    {
      "name": "CVE-2025-0441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
    },
    {
      "name": "CVE-2025-0442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
    },
    {
      "name": "CVE-2025-0443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
    },
    {
      "name": "CVE-2025-0446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
    },
    {
      "name": "CVE-2025-0447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
    },
    {
      "name": "CVE-2025-0448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
    },
    {
      "name": "CVE-2025-21523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
    },
    {
      "name": "CVE-2025-0612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
    },
    {
      "name": "CVE-2025-23083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
    },
    {
      "name": "CVE-2025-23084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
    },
    {
      "name": "CVE-2025-23085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
    },
    {
      "name": "CVE-2025-0938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
    },
    {
      "name": "CVE-2025-0444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
    },
    {
      "name": "CVE-2025-0445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
    },
    {
      "name": "CVE-2025-0451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
    },
    {
      "name": "CVE-2025-0762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
    },
    {
      "name": "CVE-2025-1009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
    },
    {
      "name": "CVE-2025-1010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
    },
    {
      "name": "CVE-2025-1011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
    },
    {
      "name": "CVE-2025-1012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
    },
    {
      "name": "CVE-2025-1013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
    },
    {
      "name": "CVE-2025-1014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
    },
    {
      "name": "CVE-2024-56664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
    },
    {
      "name": "CVE-2025-1016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
    },
    {
      "name": "CVE-2025-1017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
    },
    {
      "name": "CVE-2025-1018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
    },
    {
      "name": "CVE-2025-1019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
    },
    {
      "name": "CVE-2025-1020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2024-47535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
    },
    {
      "name": "CVE-2024-50258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
    },
    {
      "name": "CVE-2024-53203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
    },
    {
      "name": "CVE-2024-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
    },
    {
      "name": "CVE-2025-0995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
    },
    {
      "name": "CVE-2025-0996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
    },
    {
      "name": "CVE-2025-0997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
    },
    {
      "name": "CVE-2025-0998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-1414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
    },
    {
      "name": "CVE-2025-0999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
    },
    {
      "name": "CVE-2025-1006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
    },
    {
      "name": "CVE-2025-1426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2023-39017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
    },
    {
      "name": "CVE-2025-1795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
    },
    {
      "name": "CVE-2025-1914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
    },
    {
      "name": "CVE-2025-1915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
    },
    {
      "name": "CVE-2025-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
    },
    {
      "name": "CVE-2025-1917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
    },
    {
      "name": "CVE-2025-1918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
    },
    {
      "name": "CVE-2025-1919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
    },
    {
      "name": "CVE-2025-1921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
    },
    {
      "name": "CVE-2025-1922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
    },
    {
      "name": "CVE-2025-1923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
    },
    {
      "name": "CVE-2025-1930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
    },
    {
      "name": "CVE-2025-1931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
    },
    {
      "name": "CVE-2025-1932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
    },
    {
      "name": "CVE-2025-1933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
    },
    {
      "name": "CVE-2025-1934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
    },
    {
      "name": "CVE-2025-1935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
    },
    {
      "name": "CVE-2025-1936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
    },
    {
      "name": "CVE-2025-1937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
    },
    {
      "name": "CVE-2025-1938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
    },
    {
      "name": "CVE-2025-1939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
    },
    {
      "name": "CVE-2025-1940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
    },
    {
      "name": "CVE-2025-1941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
    },
    {
      "name": "CVE-2025-1942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
    },
    {
      "name": "CVE-2025-1943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
    },
    {
      "name": "CVE-2025-1920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
    },
    {
      "name": "CVE-2025-2135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
    },
    {
      "name": "CVE-2025-2136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
    },
    {
      "name": "CVE-2025-2137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
    },
    {
      "name": "CVE-2025-24813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
    },
    {
      "name": "CVE-2024-6763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
    },
    {
      "name": "CVE-2022-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2024-51744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
    },
    {
      "name": "CVE-2025-24970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
    },
    {
      "name": "CVE-2025-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
    },
    {
      "name": "CVE-2024-45772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
    },
    {
      "name": "CVE-2025-2476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
    },
    {
      "name": "CVE-2025-2857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2025-2783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2025-27113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
    },
    {
      "name": "CVE-2025-3066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
    },
    {
      "name": "CVE-2025-3067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
    },
    {
      "name": "CVE-2025-3068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
    },
    {
      "name": "CVE-2025-3071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
    },
    {
      "name": "CVE-2025-3072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
    },
    {
      "name": "CVE-2025-3073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
    },
    {
      "name": "CVE-2025-3074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
    },
    {
      "name": "CVE-2025-3028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
    },
    {
      "name": "CVE-2025-3029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
    },
    {
      "name": "CVE-2025-3030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
    },
    {
      "name": "CVE-2025-3031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
    },
    {
      "name": "CVE-2025-3032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
    },
    {
      "name": "CVE-2025-3033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
    },
    {
      "name": "CVE-2025-3034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
    },
    {
      "name": "CVE-2025-3035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2025-3608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
    },
    {
      "name": "CVE-2025-21574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
    },
    {
      "name": "CVE-2025-21575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
    },
    {
      "name": "CVE-2025-21577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
    },
    {
      "name": "CVE-2025-21579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
    },
    {
      "name": "CVE-2025-21580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
    },
    {
      "name": "CVE-2025-21581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
    },
    {
      "name": "CVE-2025-21584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
    },
    {
      "name": "CVE-2025-21585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
    },
    {
      "name": "CVE-2025-21588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
    },
    {
      "name": "CVE-2025-30681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
    },
    {
      "name": "CVE-2025-30682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
    },
    {
      "name": "CVE-2025-30683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
    },
    {
      "name": "CVE-2025-30684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
    },
    {
      "name": "CVE-2025-30685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
    },
    {
      "name": "CVE-2025-30687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
    },
    {
      "name": "CVE-2025-30688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
    },
    {
      "name": "CVE-2025-30689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
    },
    {
      "name": "CVE-2025-30693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
    },
    {
      "name": "CVE-2025-30695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
    },
    {
      "name": "CVE-2025-30696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
    },
    {
      "name": "CVE-2025-30699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
    },
    {
      "name": "CVE-2025-30703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
    },
    {
      "name": "CVE-2025-30704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
    },
    {
      "name": "CVE-2025-30705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
    },
    {
      "name": "CVE-2025-30715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
    },
    {
      "name": "CVE-2025-30721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-3619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
    },
    {
      "name": "CVE-2025-3620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
    },
    {
      "name": "CVE-2025-24928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2024-12798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
    },
    {
      "name": "CVE-2024-12801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2025-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
    },
    {
      "name": "CVE-2025-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-30204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
    },
    {
      "name": "CVE-2025-4050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
    },
    {
      "name": "CVE-2025-4051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
    },
    {
      "name": "CVE-2025-4052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
    },
    {
      "name": "CVE-2025-4096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
    },
    {
      "name": "CVE-2025-2817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
    },
    {
      "name": "CVE-2025-4082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
    },
    {
      "name": "CVE-2025-4083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
    },
    {
      "name": "CVE-2025-4085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
    },
    {
      "name": "CVE-2025-4087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
    },
    {
      "name": "CVE-2025-4088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
    },
    {
      "name": "CVE-2025-4089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
    },
    {
      "name": "CVE-2025-4090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
    },
    {
      "name": "CVE-2025-4091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
    },
    {
      "name": "CVE-2025-4092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2024-46742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
    },
    {
      "name": "CVE-2025-22071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
    },
    {
      "name": "CVE-2025-22073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
    },
    {
      "name": "CVE-2025-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2025-27516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
    },
    {
      "name": "CVE-2025-29087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
    },
    {
      "name": "CVE-2025-3277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
    },
    {
      "name": "CVE-2025-4609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
    },
    {
      "name": "CVE-2025-4664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
    },
    {
      "name": "CVE-2025-4372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
    },
    {
      "name": "CVE-2025-4516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
    },
    {
      "name": "CVE-2025-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
    },
    {
      "name": "CVE-2024-55549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
    },
    {
      "name": "CVE-2024-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
    },
    {
      "name": "CVE-2025-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
    },
    {
      "name": "CVE-2025-4918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
    },
    {
      "name": "CVE-2025-4919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
    },
    {
      "name": "CVE-2025-41232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
    },
    {
      "name": "CVE-2025-23165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
    },
    {
      "name": "CVE-2025-23166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
    },
    {
      "name": "CVE-2025-5063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
    },
    {
      "name": "CVE-2025-5064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
    },
    {
      "name": "CVE-2025-5065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
    },
    {
      "name": "CVE-2025-5066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
    },
    {
      "name": "CVE-2025-5067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
    },
    {
      "name": "CVE-2025-32414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2025-5263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
    },
    {
      "name": "CVE-2025-5264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
    },
    {
      "name": "CVE-2025-5265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
    },
    {
      "name": "CVE-2025-5266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
    },
    {
      "name": "CVE-2025-5267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
    },
    {
      "name": "CVE-2025-5268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
    },
    {
      "name": "CVE-2025-5270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
    },
    {
      "name": "CVE-2025-5271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
    },
    {
      "name": "CVE-2025-5272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
    },
    {
      "name": "CVE-2025-5281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
    },
    {
      "name": "CVE-2025-5283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
    },
    {
      "name": "CVE-2025-46701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-37889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-37909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-37923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
    },
    {
      "name": "CVE-2025-37927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2025-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
    },
    {
      "name": "CVE-2025-5068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
    },
    {
      "name": "CVE-2025-5419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
    },
    {
      "name": "CVE-2025-27144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
    },
    {
      "name": "CVE-2025-49709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
    },
    {
      "name": "CVE-2025-49710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
    },
    {
      "name": "CVE-2023-6779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
    },
    {
      "name": "CVE-2023-6780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2024-2236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
    },
    {
      "name": "CVE-2024-56433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
    },
    {
      "name": "CVE-2025-0395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
    },
    {
      "name": "CVE-2025-1390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
    },
    {
      "name": "CVE-2025-29088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
    },
    {
      "name": "CVE-2025-31115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
    },
    {
      "name": "CVE-2025-4598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
    },
    {
      "name": "CVE-2025-5958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
    },
    {
      "name": "CVE-2025-5959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
    },
    {
      "name": "CVE-2025-41234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
    },
    {
      "name": "CVE-2025-49146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
    },
    {
      "name": "CVE-2025-48988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
    },
    {
      "name": "CVE-2025-49124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
    },
    {
      "name": "CVE-2025-49125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
    },
    {
      "name": "CVE-2025-6191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
    },
    {
      "name": "CVE-2025-6192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
    },
    {
      "name": "CVE-2024-53427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
    },
    {
      "name": "CVE-2024-56406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
    },
    {
      "name": "CVE-2025-22872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
    },
    {
      "name": "CVE-2025-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2023-42366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
    },
    {
      "name": "CVE-2025-6424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
    },
    {
      "name": "CVE-2025-6425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
    },
    {
      "name": "CVE-2025-6426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
    },
    {
      "name": "CVE-2025-6427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
    },
    {
      "name": "CVE-2025-6429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
    },
    {
      "name": "CVE-2025-6430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
    },
    {
      "name": "CVE-2025-6432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
    },
    {
      "name": "CVE-2025-6433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
    },
    {
      "name": "CVE-2025-6434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
    },
    {
      "name": "CVE-2025-6020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
    },
    {
      "name": "CVE-2025-6555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
    },
    {
      "name": "CVE-2025-6556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
    },
    {
      "name": "CVE-2025-6557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
    },
    {
      "name": "CVE-2025-6435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
    },
    {
      "name": "CVE-2025-6436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
    },
    {
      "name": "CVE-2025-6554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
    },
    {
      "name": "CVE-2025-6021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
    },
    {
      "name": "CVE-2022-49636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2025-32462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
    },
    {
      "name": "CVE-2025-52520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
    },
    {
      "name": "CVE-2025-53506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
    },
    {
      "name": "CVE-2024-47081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
    },
    {
      "name": "CVE-2025-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
    },
    {
      "name": "CVE-2025-47268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2025-22227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
    },
    {
      "name": "CVE-2025-6558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
    },
    {
      "name": "CVE-2025-7656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
    },
    {
      "name": "CVE-2025-7657",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
    },
    {
      "name": "CVE-2025-30749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
    },
    {
      "name": "CVE-2025-30754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
    },
    {
      "name": "CVE-2025-50059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
    },
    {
      "name": "CVE-2025-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
    },
    {
      "name": "CVE-2025-50088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
    },
    {
      "name": "CVE-2025-48734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
    },
    {
      "name": "CVE-2022-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
    },
    {
      "name": "CVE-2020-16156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
    },
    {
      "name": "CVE-2025-8010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
    },
    {
      "name": "CVE-2025-8011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
    },
    {
      "name": "CVE-2025-8027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
    },
    {
      "name": "CVE-2025-8028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
    },
    {
      "name": "CVE-2025-8029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
    },
    {
      "name": "CVE-2025-8030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
    },
    {
      "name": "CVE-2025-8031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
    },
    {
      "name": "CVE-2025-8032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
    },
    {
      "name": "CVE-2025-8033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
    },
    {
      "name": "CVE-2025-8034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
    },
    {
      "name": "CVE-2025-8035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
    },
    {
      "name": "CVE-2025-8036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
    },
    {
      "name": "CVE-2025-8037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
    },
    {
      "name": "CVE-2025-8038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
    },
    {
      "name": "CVE-2025-8039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
    },
    {
      "name": "CVE-2025-8040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
    },
    {
      "name": "CVE-2025-8041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
    },
    {
      "name": "CVE-2025-8043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
    },
    {
      "name": "CVE-2025-8044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
    },
    {
      "name": "CVE-2024-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
    },
    {
      "name": "CVE-2024-45339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
    },
    {
      "name": "CVE-2024-47611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
    },
    {
      "name": "CVE-2025-0913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
    },
    {
      "name": "CVE-2025-22874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
    },
    {
      "name": "CVE-2025-32988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
    },
    {
      "name": "CVE-2025-32989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
    },
    {
      "name": "CVE-2025-32990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
    },
    {
      "name": "CVE-2025-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
    },
    {
      "name": "CVE-2025-4673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
    },
    {
      "name": "CVE-2025-48060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
    },
    {
      "name": "CVE-2025-4877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
    },
    {
      "name": "CVE-2025-4878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
    },
    {
      "name": "CVE-2025-48924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
    },
    {
      "name": "CVE-2025-50181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
    },
    {
      "name": "CVE-2025-5318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
    },
    {
      "name": "CVE-2025-5372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
    },
    {
      "name": "CVE-2025-5914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
    },
    {
      "name": "CVE-2025-5915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
    },
    {
      "name": "CVE-2025-5916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
    },
    {
      "name": "CVE-2025-5917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
    },
    {
      "name": "CVE-2025-6069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
    },
    {
      "name": "CVE-2025-6395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-8194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
    },
    {
      "name": "CVE-2025-8292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
    },
    {
      "name": "CVE-2025-7424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
    },
    {
      "name": "CVE-2025-7425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
    },
    {
      "name": "CVE-2025-50182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
    },
    {
      "name": "CVE-2025-5889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
    },
    {
      "name": "CVE-2025-8576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
    },
    {
      "name": "CVE-2025-8577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
    },
    {
      "name": "CVE-2025-8578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
    },
    {
      "name": "CVE-2025-8579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
    },
    {
      "name": "CVE-2025-8580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
    },
    {
      "name": "CVE-2025-8581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
    },
    {
      "name": "CVE-2025-8582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
    },
    {
      "name": "CVE-2025-8583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
    },
    {
      "name": "CVE-2025-27210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
    },
    {
      "name": "CVE-2025-27817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
    },
    {
      "name": "CVE-2025-27818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
    },
    {
      "name": "CVE-2025-8879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
    },
    {
      "name": "CVE-2025-8880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
    },
    {
      "name": "CVE-2025-8881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
    },
    {
      "name": "CVE-2025-8882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
    },
    {
      "name": "CVE-2025-8901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
    },
    {
      "name": "CVE-2025-48989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
    },
    {
      "name": "CVE-2025-7339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
    },
    {
      "name": "CVE-2025-7783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
    },
    {
      "name": "CVE-2021-32256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
    },
    {
      "name": "CVE-2024-25260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
    },
    {
      "name": "CVE-2025-1371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
    },
    {
      "name": "CVE-2025-1376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
    },
    {
      "name": "CVE-2025-1377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
    },
    {
      "name": "CVE-2025-47273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
    },
    {
      "name": "CVE-2025-48964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
    },
    {
      "name": "CVE-2025-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
    },
    {
      "name": "CVE-2025-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
    },
    {
      "name": "CVE-2025-41242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
    },
    {
      "name": "CVE-2025-9132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
    },
    {
      "name": "CVE-2025-54988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
    },
    {
      "name": "CVE-2025-6965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
    },
    {
      "name": "CVE-2024-13009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
    },
    {
      "name": "CVE-2025-55668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
    },
    {
      "name": "CVE-2025-4674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
    },
    {
      "name": "CVE-2025-47907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
    },
    {
      "name": "CVE-2025-52999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
    },
    {
      "name": "CVE-2025-55163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
    },
    {
      "name": "CVE-2025-8941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
    },
    {
      "name": "CVE-2025-9288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
    },
    {
      "name": "CVE-2005-2541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
    },
    {
      "name": "CVE-2008-5727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
    },
    {
      "name": "CVE-2008-5728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
    },
    {
      "name": "CVE-2008-5729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
    },
    {
      "name": "CVE-2008-5730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
    },
    {
      "name": "CVE-2008-5742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
    },
    {
      "name": "CVE-2011-3374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
    },
    {
      "name": "CVE-2014-4715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
    },
    {
      "name": "CVE-2015-2214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
    },
    {
      "name": "CVE-2016-0682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
    },
    {
      "name": "CVE-2016-0689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
    },
    {
      "name": "CVE-2016-0692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
    },
    {
      "name": "CVE-2016-0694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
    },
    {
      "name": "CVE-2016-2149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
    },
    {
      "name": "CVE-2016-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
    },
    {
      "name": "CVE-2016-3418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
    },
    {
      "name": "CVE-2017-10140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
    },
    {
      "name": "CVE-2017-12195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
    },
    {
      "name": "CVE-2017-12629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
    },
    {
      "name": "CVE-2017-3604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
    },
    {
      "name": "CVE-2017-3605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
    },
    {
      "name": "CVE-2017-3606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
    },
    {
      "name": "CVE-2017-3607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
    },
    {
      "name": "CVE-2017-3608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
    },
    {
      "name": "CVE-2017-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
    },
    {
      "name": "CVE-2017-3610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
    },
    {
      "name": "CVE-2017-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
    },
    {
      "name": "CVE-2017-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
    },
    {
      "name": "CVE-2017-3613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
    },
    {
      "name": "CVE-2017-3614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
    },
    {
      "name": "CVE-2017-3615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
    },
    {
      "name": "CVE-2017-3616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
    },
    {
      "name": "CVE-2017-3617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
    },
    {
      "name": "CVE-2018-1000169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
    },
    {
      "name": "CVE-2018-1196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
    },
    {
      "name": "CVE-2018-1273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
    },
    {
      "name": "CVE-2019-10782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
    },
    {
      "name": "CVE-2019-9658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
    },
    {
      "name": "CVE-2020-2981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
    },
    {
      "name": "CVE-2021-20298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
    },
    {
      "name": "CVE-2021-20304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
    },
    {
      "name": "CVE-2021-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
    },
    {
      "name": "CVE-2021-23169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
    },
    {
      "name": "CVE-2021-3236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
    },
    {
      "name": "CVE-2022-0635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
    },
    {
      "name": "CVE-2022-0667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
    },
    {
      "name": "CVE-2022-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
    },
    {
      "name": "CVE-2022-39046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
    },
    {
      "name": "CVE-2022-42010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
    },
    {
      "name": "CVE-2022-42011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
    },
    {
      "name": "CVE-2022-42012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
    },
    {
      "name": "CVE-2022-44638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
    },
    {
      "name": "CVE-2023-31437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
    },
    {
      "name": "CVE-2023-31438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
    },
    {
      "name": "CVE-2023-31439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
    },
    {
      "name": "CVE-2023-37769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
    },
    {
      "name": "CVE-2023-39810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
    },
    {
      "name": "CVE-2023-4156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
    },
    {
      "name": "CVE-2023-4320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
    },
    {
      "name": "CVE-2023-43785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
    },
    {
      "name": "CVE-2023-43786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
    },
    {
      "name": "CVE-2023-43787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
    },
    {
      "name": "CVE-2023-46129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
    },
    {
      "name": "CVE-2023-47039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
    },
    {
      "name": "CVE-2023-5189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
    },
    {
      "name": "CVE-2024-11584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
    },
    {
      "name": "CVE-2024-21742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
    },
    {
      "name": "CVE-2024-22047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
    },
    {
      "name": "CVE-2024-2397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
    },
    {
      "name": "CVE-2024-26462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
    },
    {
      "name": "CVE-2024-31047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
    },
    {
      "name": "CVE-2024-3220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
    },
    {
      "name": "CVE-2024-58251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
    },
    {
      "name": "CVE-2024-6174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
    },
    {
      "name": "CVE-2024-7012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
    },
    {
      "name": "CVE-2025-1352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
    },
    {
      "name": "CVE-2025-1365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
    },
    {
      "name": "CVE-2025-1372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
    },
    {
      "name": "CVE-2025-24294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
    },
    {
      "name": "CVE-2025-26519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
    },
    {
      "name": "CVE-2025-27587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
    },
    {
      "name": "CVE-2025-30258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
    },
    {
      "name": "CVE-2025-31672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
    },
    {
      "name": "CVE-2025-40909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
    },
    {
      "name": "CVE-2025-43857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
    },
    {
      "name": "CVE-2025-45582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
    },
    {
      "name": "CVE-2025-45768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
    },
    {
      "name": "CVE-2025-46392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
    },
    {
      "name": "CVE-2025-46394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
    },
    {
      "name": "CVE-2025-49795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
    },
    {
      "name": "CVE-2025-5115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
    },
    {
      "name": "CVE-2025-5222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
    },
    {
      "name": "CVE-2025-5278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
    },
    {
      "name": "CVE-2025-53864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
    },
    {
      "name": "CVE-2025-6170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
    },
    {
      "name": "CVE-2025-6297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
    },
    {
      "name": "CVE-2025-7962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
    },
    {
      "name": "CVE-2025-8058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
    },
    {
      "name": "CVE-2025-8262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
    },
    {
      "name": "CVE-2025-8732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
    },
    {
      "name": "CVE-2025-8885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
    },
    {
      "name": "CVE-2025-8916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
    },
    {
      "name": "CVE-2025-9179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
    },
    {
      "name": "CVE-2025-9180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
    },
    {
      "name": "CVE-2025-9181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
    },
    {
      "name": "CVE-2025-9182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
    },
    {
      "name": "CVE-2025-9183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
    },
    {
      "name": "CVE-2025-9184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
    },
    {
      "name": "CVE-2025-9185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
    },
    {
      "name": "CVE-2025-9187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
    },
    {
      "name": "CVE-2025-9308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
    }
  ],
  "initial_release_date": "2025-09-05T00:00:00",
  "last_revision_date": "2025-09-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0756",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
    }
  ]
}
  CERTFR-2025-AVI-0907
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 8.4.0 à 8.4.3 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Cluster version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 9.0.0 à 9.1.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 8.0.0 à 8.0.40 | ||
| Oracle | MySQL | MySQL Cluster version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Workbench version 8.0.0 à 8.0.43 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "MySQL Server (Server: Optimizer) version 9.0.0 \u00e0 9.4.0",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Enterprise Backup version 8.4.0 \u00e0 8.4.5",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 8.4.0 \u00e0 8.4.6",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Enterprise Backup version 9.0.0 \u00e0 9.3.0",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (InnoDB) version 9.0.0 \u00e0 9.4.0",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 8.4.0 \u00e0 8.4.3",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Enterprise Backup version 8.0.0 \u00e0 8.0.42",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (InnoDB) version 8.0.0 \u00e0 8.0.43",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 8.0.0 \u00e0 8.0.43",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Components Services) version 8.4.0 \u00e0 8.4.6",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 9.0.0 \u00e0 9.4.0",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 9.0.0 \u00e0 9.1.0",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (InnoDB) version 8.4.0 \u00e0 8.4.6",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: DML) version 8.0.0 \u00e0 8.0.43",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 8.4.0 \u00e0 8.4.6",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: DML) version 8.4.0 \u00e0 8.4.6",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Components Services) version 9.0.0 \u00e0 9.4.0",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 8.0.0 \u00e0 8.0.40",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 8.0.0 \u00e0 8.0.43",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Components Services) version 8.0.0 \u00e0 8.0.43",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: DML) version 9.0.0 \u00e0 9.4.0",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Workbench version 8.0.0 \u00e0 8.0.43",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-53042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
    },
    {
      "name": "CVE-2025-53062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
    },
    {
      "name": "CVE-2025-5449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5449"
    },
    {
      "name": "CVE-2025-5987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
    },
    {
      "name": "CVE-2025-4330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
    },
    {
      "name": "CVE-2025-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
    },
    {
      "name": "CVE-2025-4138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
    },
    {
      "name": "CVE-2025-5372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
    },
    {
      "name": "CVE-2025-53067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53067"
    },
    {
      "name": "CVE-2025-4877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
    },
    {
      "name": "CVE-2025-6965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
    },
    {
      "name": "CVE-2025-4517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
    },
    {
      "name": "CVE-2025-5318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
    },
    {
      "name": "CVE-2025-4435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
    },
    {
      "name": "CVE-2024-12718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
    },
    {
      "name": "CVE-2025-5351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
    },
    {
      "name": "CVE-2025-4878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2025-53069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
    },
    {
      "name": "CVE-2025-49795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
    },
    {
      "name": "CVE-2025-53044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
    },
    {
      "name": "CVE-2025-53054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
    },
    {
      "name": "CVE-2025-53040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
    },
    {
      "name": "CVE-2025-53045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
    },
    {
      "name": "CVE-2025-53053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
    },
    {
      "name": "CVE-2025-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2025-5399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5399"
    }
  ],
  "initial_release_date": "2025-10-22T00:00:00",
  "last_revision_date": "2025-10-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0907",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
  "vendor_advisories": [
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2025",
      "url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
    }
  ]
}
  rhsa-2025:19020
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 2 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 2 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 1, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing [jbcs-httpd-2.4] (CVE-2025-59375)\n* libxml2: Heap use after free (UAF) leads to Denial of service (DoS) [jbcs-httpd-2.4] (CVE-2025-49794)\n* libxml2: Null pointer dereference leads to Denial of service (DoS) [jbcs-httpd-2.4] (CVE-2025-49795)\n* libxml2: Type confusion leads to Denial of service (DoS) [jbcs-httpd-2.4] (CVE-2025-49796)\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 [jbcs-httpd-2.4] (CVE-2025-6021)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:19020",
        "url": "https://access.redhat.com/errata/RHSA-2025:19020"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_service_pack_2_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_service_pack_2_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2372373",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
      },
      {
        "category": "external",
        "summary": "2372379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
      },
      {
        "category": "external",
        "summary": "2372385",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
      },
      {
        "category": "external",
        "summary": "2372406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
      },
      {
        "category": "external",
        "summary": "2395108",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395108"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19020.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 SP2 security update",
    "tracking": {
      "current_release_date": "2025-11-03T04:14:34+00:00",
      "generator": {
        "date": "2025-11-03T04:14:34+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2025:19020",
      "initial_release_date": "2025-10-27T17:46:24+00:00",
      "revision_history": [
        {
          "date": "2025-10-27T17:46:24+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-10-27T17:46:24+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-11-03T04:14:34+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services 2.4.62.SP2",
                "product": {
                  "name": "Red Hat JBoss Core Services 2.4.62.SP2",
                  "product_id": "Red Hat JBoss Core Services 2.4.62.SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Ahmed Lekssays"
          ]
        }
      ],
      "cve": "CVE-2025-6021",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2025-06-12T07:55:45.428000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2372406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service  from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Core Services 2.4.62.SP2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-6021"
        },
        {
          "category": "external",
          "summary": "RHBZ#2372406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
        }
      ],
      "release_date": "2025-06-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-10-27T17:46:24+00:00",
          "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:19020"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
    },
    {
      "cve": "CVE-2025-49794",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2025-06-11T21:33:43.044000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2372373"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Core Services 2.4.62.SP2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-49794"
        },
        {
          "category": "external",
          "summary": "RHBZ#2372373",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
        }
      ],
      "release_date": "2025-06-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-10-27T17:46:24+00:00",
          "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:19020"
        },
        {
          "category": "workaround",
          "details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
    },
    {
      "cve": "CVE-2025-49795",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2025-06-12T00:31:08.194000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2372379"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libxml: Null pointer dereference leads to Denial of service (DoS)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability marked as Important rather than Moderate due to its triggerability through untrusted input and impact on availability in a widely-used XML processing library like libxml2, which is often embedded in system-level and server-side applications. Although it is \"just\" a NULL pointer dereference\u2014typically classified as a DoS\u2014the context significantly elevates its severity. libxml2 frequently operates in environments that parse external XML content, such as web services, security scanners, and document processors. A crafted XML exploiting malformed XPath in Schematron schemas can reliably crash the application without requiring special privileges or user interaction.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Core Services 2.4.62.SP2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-49795"
        },
        {
          "category": "external",
          "summary": "RHBZ#2372379",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-49795",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795"
        }
      ],
      "release_date": "2025-06-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-10-27T17:46:24+00:00",
          "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:19020"
        },
        {
          "category": "workaround",
          "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "libxml: Null pointer dereference leads to Denial of service (DoS)"
    },
    {
      "cve": "CVE-2025-49796",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2025-06-12T00:35:26.470000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2372385"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libxml: Type confusion leads to Denial of service (DoS)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Core Services 2.4.62.SP2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-49796"
        },
        {
          "category": "external",
          "summary": "RHBZ#2372385",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
        }
      ],
      "release_date": "2025-06-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-10-27T17:46:24+00:00",
          "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:19020"
        },
        {
          "category": "workaround",
          "details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "libxml: Type confusion leads to Denial of service (DoS)"
    },
    {
      "cve": "CVE-2025-59375",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2025-09-15T03:00:59.775098+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2395108"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is Important rather than Critical because, while it allows for significant resource exhaustion leading to denial-of-service (DoS), it does not enable arbitrary code execution, data leakage, or privilege escalation. The vulnerability stems from an uncontrolled memory amplification behavior in libexpat\u2019s parser, where a relatively small XML payload can cause disproportionately large heap allocations. However, the flaw is limited in scope to service disruption and requires the attacker to submit a crafted XML document\u2014something that can be mitigated with proper input validation and memory usage limits. Therefore, while the exploitability is high, the impact is confined to availability, not confidentiality or integrity, making it a high-severity but not critical flaw.\n\nIn Firefox and Thunderbird, where libexpat is a transitive userspace dependency, exploitation usually just crashes the application (app-level DoS), so it is classify as Moderate instead of Important.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Core Services 2.4.62.SP2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-59375"
        },
        {
          "category": "external",
          "summary": "RHBZ#2395108",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395108"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-59375",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375"
        },
        {
          "category": "external",
          "summary": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74",
          "url": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74"
        },
        {
          "category": "external",
          "summary": "https://github.com/libexpat/libexpat/issues/1018",
          "url": "https://github.com/libexpat/libexpat/issues/1018"
        },
        {
          "category": "external",
          "summary": "https://github.com/libexpat/libexpat/pull/1034",
          "url": "https://github.com/libexpat/libexpat/pull/1034"
        },
        {
          "category": "external",
          "summary": "https://issues.oss-fuzz.com/issues/439133977",
          "url": "https://issues.oss-fuzz.com/issues/439133977"
        }
      ],
      "release_date": "2025-09-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-10-27T17:46:24+00:00",
          "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:19020"
        },
        {
          "category": "workaround",
          "details": "To mitigate the issue, limit XML input size and complexity before parsing, and avoid accepting compressed or deeply nested XML. Use OS-level resource controls (like ulimit or setrlimit()) to cap memory usage, or run the parser in a sandboxed or isolated process with strict memory and CPU limits. This helps prevent denial-of-service by containing excessive resource consumption.",
          "product_ids": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "Red Hat JBoss Core Services 2.4.62.SP2"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing"
    }
  ]
}
  rhsa-2025:10630
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libxml2 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:10630",
        "url": "https://access.redhat.com/errata/RHSA-2025:10630"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2372373",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
      },
      {
        "category": "external",
        "summary": "2372379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
      },
      {
        "category": "external",
        "summary": "2372385",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
      },
      {
        "category": "external",
        "summary": "2372406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10630.json"
      }
    ],
    "title": "Red Hat Security Advisory: libxml2 security update",
    "tracking": {
      "current_release_date": "2025-10-30T06:43:44+00:00",
      "generator": {
        "date": "2025-10-30T06:43:44+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2025:10630",
      "initial_release_date": "2025-07-08T21:17:21+00:00",
      "revision_history": [
        {
          "date": "2025-07-08T21:17:21+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-07-08T21:17:21+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-30T06:43:44+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 10)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 10)",
                  "product_id": "AppStream-10.0.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:10.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 10)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 10)",
                  "product_id": "BaseOS-10.0.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:10.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
                "product": {
                  "name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
                  "product_id": "CRB-10.0.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:10.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-0:2.12.5-7.el10_0.src",
                "product": {
                  "name": "libxml2-0:2.12.5-7.el10_0.src",
                  "product_id": "libxml2-0:2.12.5-7.el10_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-0:2.12.5-7.el10_0.aarch64",
                "product": {
                  "name": "libxml2-0:2.12.5-7.el10_0.aarch64",
                  "product_id": "libxml2-0:2.12.5-7.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
                "product": {
                  "name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
                  "product_id": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-7.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
                "product": {
                  "name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
                  "product_id": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-7.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
                "product": {
                  "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
                  "product_id": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-7.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
                "product": {
                  "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
                  "product_id": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-7.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
                "product": {
                  "name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
                  "product_id": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-7.el10_0?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
                "product": {
                  "name": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
                  "product_id": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-static@2.12.5-7.el10_0?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-0:2.12.5-7.el10_0.ppc64le",
                "product": {
                  "name": "libxml2-0:2.12.5-7.el10_0.ppc64le",
                  "product_id": "libxml2-0:2.12.5-7.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
                "product": {
                  "name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
                  "product_id": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-7.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
                "product": {
                  "name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
                  "product_id": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-7.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
                "product": {
                  "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
                  "product_id": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-7.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
                "product": {
                  "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
                  "product_id": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-7.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
                "product": {
                  "name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
                  "product_id": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-7.el10_0?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
                "product": {
                  "name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
                  "product_id": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-static@2.12.5-7.el10_0?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-0:2.12.5-7.el10_0.x86_64",
                "product": {
                  "name": "libxml2-0:2.12.5-7.el10_0.x86_64",
                  "product_id": "libxml2-0:2.12.5-7.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
                "product": {
                  "name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
                  "product_id": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-7.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
                "product": {
                  "name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
                  "product_id": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-7.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
                "product": {
                  "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
                  "product_id": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-7.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
                "product": {
                  "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
                  "product_id": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-7.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
                "product": {
                  "name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
                  "product_id": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-7.el10_0?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
                "product": {
                  "name": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
                  "product_id": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-static@2.12.5-7.el10_0?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-0:2.12.5-7.el10_0.s390x",
                "product": {
                  "name": "libxml2-0:2.12.5-7.el10_0.s390x",
                  "product_id": "libxml2-0:2.12.5-7.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
                "product": {
                  "name": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
                  "product_id": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-7.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
                "product": {
                  "name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
                  "product_id": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-7.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
                "product": {
                  "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
                  "product_id": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-7.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
                "product": {
                  "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
                  "product_id": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-7.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
                "product": {
                  "name": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
                  "product_id": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-7.el10_0?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-static-0:2.12.5-7.el10_0.s390x",
                "product": {
                  "name": "libxml2-static-0:2.12.5-7.el10_0.s390x",
                  "product_id": "libxml2-static-0:2.12.5-7.el10_0.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libxml2-static@2.12.5-7.el10_0?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.src",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
          "product_id": "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "AppStream-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.src",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
          "product_id": "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "BaseOS-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.src",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
        "relates_to_product_reference": "CRB-10.0.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
          "product_id": "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        },
        "product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
        "relates_to_product_reference": "CRB-10.0.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Ahmed Lekssays"
          ]
        }
      ],
      "cve": "CVE-2025-6021",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2025-06-12T07:55:45.428000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2372406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service  from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-6021"
        },
        {
          "category": "external",
          "summary": "RHBZ#2372406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
        }
      ],
      "release_date": "2025-06-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-08T21:17:21+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:10630"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
          "product_ids": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
    },
    {
      "cve": "CVE-2025-49794",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2025-06-11T21:33:43.044000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2372373"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-49794"
        },
        {
          "category": "external",
          "summary": "RHBZ#2372373",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
        }
      ],
      "release_date": "2025-06-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-08T21:17:21+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:10630"
        },
        {
          "category": "workaround",
          "details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
          "product_ids": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
    },
    {
      "cve": "CVE-2025-49795",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2025-06-12T00:31:08.194000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2372379"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libxml: Null pointer dereference leads to Denial of service (DoS)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability marked as Important rather than Moderate due to its triggerability through untrusted input and impact on availability in a widely-used XML processing library like libxml2, which is often embedded in system-level and server-side applications. Although it is \"just\" a NULL pointer dereference\u2014typically classified as a DoS\u2014the context significantly elevates its severity. libxml2 frequently operates in environments that parse external XML content, such as web services, security scanners, and document processors. A crafted XML exploiting malformed XPath in Schematron schemas can reliably crash the application without requiring special privileges or user interaction.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-49795"
        },
        {
          "category": "external",
          "summary": "RHBZ#2372379",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-49795",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795"
        }
      ],
      "release_date": "2025-06-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-08T21:17:21+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:10630"
        },
        {
          "category": "workaround",
          "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.",
          "product_ids": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "libxml: Null pointer dereference leads to Denial of service (DoS)"
    },
    {
      "cve": "CVE-2025-49796",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2025-06-12T00:35:26.470000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2372385"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libxml: Type confusion leads to Denial of service (DoS)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
          "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
          "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-49796"
        },
        {
          "category": "external",
          "summary": "RHBZ#2372385",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
        }
      ],
      "release_date": "2025-06-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-08T21:17:21+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:10630"
        },
        {
          "category": "workaround",
          "details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
          "product_ids": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
            "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
            "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "libxml: Type confusion leads to Denial of service (DoS)"
    }
  ]
}
  opensuse-su-2025:15321-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "libxml2-2-2.13.8-2.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the libxml2-2-2.13.8-2.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2025-15321",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15321-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-49794 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-49794/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-49795 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-49795/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-49796 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-49796/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-6021 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-6021/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-6170 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-6170/"
      }
    ],
    "title": "libxml2-2-2.13.8-2.1 on GA media",
    "tracking": {
      "current_release_date": "2025-07-08T00:00:00Z",
      "generator": {
        "date": "2025-07-08T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2025:15321-1",
      "initial_release_date": "2025-07-08T00:00:00Z",
      "revision_history": [
        {
          "date": "2025-07-08T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-2.13.8-2.1.aarch64",
                "product": {
                  "name": "libxml2-2-2.13.8-2.1.aarch64",
                  "product_id": "libxml2-2-2.13.8-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-2-32bit-2.13.8-2.1.aarch64",
                "product": {
                  "name": "libxml2-2-32bit-2.13.8-2.1.aarch64",
                  "product_id": "libxml2-2-32bit-2.13.8-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-2.13.8-2.1.aarch64",
                "product": {
                  "name": "libxml2-devel-2.13.8-2.1.aarch64",
                  "product_id": "libxml2-devel-2.13.8-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-32bit-2.13.8-2.1.aarch64",
                "product": {
                  "name": "libxml2-devel-32bit-2.13.8-2.1.aarch64",
                  "product_id": "libxml2-devel-32bit-2.13.8-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-doc-2.13.8-2.1.aarch64",
                "product": {
                  "name": "libxml2-doc-2.13.8-2.1.aarch64",
                  "product_id": "libxml2-doc-2.13.8-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-tools-2.13.8-2.1.aarch64",
                "product": {
                  "name": "libxml2-tools-2.13.8-2.1.aarch64",
                  "product_id": "libxml2-tools-2.13.8-2.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-2.13.8-2.1.ppc64le",
                "product": {
                  "name": "libxml2-2-2.13.8-2.1.ppc64le",
                  "product_id": "libxml2-2-2.13.8-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-2-32bit-2.13.8-2.1.ppc64le",
                "product": {
                  "name": "libxml2-2-32bit-2.13.8-2.1.ppc64le",
                  "product_id": "libxml2-2-32bit-2.13.8-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-2.13.8-2.1.ppc64le",
                "product": {
                  "name": "libxml2-devel-2.13.8-2.1.ppc64le",
                  "product_id": "libxml2-devel-2.13.8-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-32bit-2.13.8-2.1.ppc64le",
                "product": {
                  "name": "libxml2-devel-32bit-2.13.8-2.1.ppc64le",
                  "product_id": "libxml2-devel-32bit-2.13.8-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-doc-2.13.8-2.1.ppc64le",
                "product": {
                  "name": "libxml2-doc-2.13.8-2.1.ppc64le",
                  "product_id": "libxml2-doc-2.13.8-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-tools-2.13.8-2.1.ppc64le",
                "product": {
                  "name": "libxml2-tools-2.13.8-2.1.ppc64le",
                  "product_id": "libxml2-tools-2.13.8-2.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-2.13.8-2.1.s390x",
                "product": {
                  "name": "libxml2-2-2.13.8-2.1.s390x",
                  "product_id": "libxml2-2-2.13.8-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-2-32bit-2.13.8-2.1.s390x",
                "product": {
                  "name": "libxml2-2-32bit-2.13.8-2.1.s390x",
                  "product_id": "libxml2-2-32bit-2.13.8-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-2.13.8-2.1.s390x",
                "product": {
                  "name": "libxml2-devel-2.13.8-2.1.s390x",
                  "product_id": "libxml2-devel-2.13.8-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-32bit-2.13.8-2.1.s390x",
                "product": {
                  "name": "libxml2-devel-32bit-2.13.8-2.1.s390x",
                  "product_id": "libxml2-devel-32bit-2.13.8-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-doc-2.13.8-2.1.s390x",
                "product": {
                  "name": "libxml2-doc-2.13.8-2.1.s390x",
                  "product_id": "libxml2-doc-2.13.8-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-tools-2.13.8-2.1.s390x",
                "product": {
                  "name": "libxml2-tools-2.13.8-2.1.s390x",
                  "product_id": "libxml2-tools-2.13.8-2.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-2.13.8-2.1.x86_64",
                "product": {
                  "name": "libxml2-2-2.13.8-2.1.x86_64",
                  "product_id": "libxml2-2-2.13.8-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-2-32bit-2.13.8-2.1.x86_64",
                "product": {
                  "name": "libxml2-2-32bit-2.13.8-2.1.x86_64",
                  "product_id": "libxml2-2-32bit-2.13.8-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-2.13.8-2.1.x86_64",
                "product": {
                  "name": "libxml2-devel-2.13.8-2.1.x86_64",
                  "product_id": "libxml2-devel-2.13.8-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-32bit-2.13.8-2.1.x86_64",
                "product": {
                  "name": "libxml2-devel-32bit-2.13.8-2.1.x86_64",
                  "product_id": "libxml2-devel-32bit-2.13.8-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-doc-2.13.8-2.1.x86_64",
                "product": {
                  "name": "libxml2-doc-2.13.8-2.1.x86_64",
                  "product_id": "libxml2-doc-2.13.8-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-tools-2.13.8-2.1.x86_64",
                "product": {
                  "name": "libxml2-tools-2.13.8-2.1.x86_64",
                  "product_id": "libxml2-tools-2.13.8-2.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64"
        },
        "product_reference": "libxml2-2-2.13.8-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le"
        },
        "product_reference": "libxml2-2-2.13.8-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x"
        },
        "product_reference": "libxml2-2-2.13.8-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64"
        },
        "product_reference": "libxml2-2-2.13.8-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-32bit-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64"
        },
        "product_reference": "libxml2-2-32bit-2.13.8-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-32bit-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le"
        },
        "product_reference": "libxml2-2-32bit-2.13.8-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-32bit-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x"
        },
        "product_reference": "libxml2-2-32bit-2.13.8-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-32bit-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64"
        },
        "product_reference": "libxml2-2-32bit-2.13.8-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64"
        },
        "product_reference": "libxml2-devel-2.13.8-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le"
        },
        "product_reference": "libxml2-devel-2.13.8-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x"
        },
        "product_reference": "libxml2-devel-2.13.8-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64"
        },
        "product_reference": "libxml2-devel-2.13.8-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-32bit-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64"
        },
        "product_reference": "libxml2-devel-32bit-2.13.8-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-32bit-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le"
        },
        "product_reference": "libxml2-devel-32bit-2.13.8-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-32bit-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x"
        },
        "product_reference": "libxml2-devel-32bit-2.13.8-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-32bit-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64"
        },
        "product_reference": "libxml2-devel-32bit-2.13.8-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-doc-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64"
        },
        "product_reference": "libxml2-doc-2.13.8-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-doc-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le"
        },
        "product_reference": "libxml2-doc-2.13.8-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-doc-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x"
        },
        "product_reference": "libxml2-doc-2.13.8-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-doc-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64"
        },
        "product_reference": "libxml2-doc-2.13.8-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-tools-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64"
        },
        "product_reference": "libxml2-tools-2.13.8-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-tools-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le"
        },
        "product_reference": "libxml2-tools-2.13.8-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-tools-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x"
        },
        "product_reference": "libxml2-tools-2.13.8-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-tools-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
        },
        "product_reference": "libxml2-tools-2.13.8-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-49794",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-49794"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-49794",
          "url": "https://www.suse.com/security/cve/CVE-2025-49794"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244554 for CVE-2025-49794",
          "url": "https://bugzilla.suse.com/1244554"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-08T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-49794"
    },
    {
      "cve": "CVE-2025-49795",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-49795"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-49795",
          "url": "https://www.suse.com/security/cve/CVE-2025-49795"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244555 for CVE-2025-49795",
          "url": "https://bugzilla.suse.com/1244555"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-08T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-49795"
    },
    {
      "cve": "CVE-2025-49796",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-49796"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-49796",
          "url": "https://www.suse.com/security/cve/CVE-2025-49796"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244557 for CVE-2025-49796",
          "url": "https://bugzilla.suse.com/1244557"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-08T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-49796"
    },
    {
      "cve": "CVE-2025-6021",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-6021"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-6021",
          "url": "https://www.suse.com/security/cve/CVE-2025-6021"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244580 for CVE-2025-6021",
          "url": "https://bugzilla.suse.com/1244580"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-08T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-6021"
    },
    {
      "cve": "CVE-2025-6170",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-6170"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
          "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-6170",
          "url": "https://www.suse.com/security/cve/CVE-2025-6170"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244700 for CVE-2025-6170",
          "url": "https://bugzilla.suse.com/1244700"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
            "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-08T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-6170"
    }
  ]
}
  suse-su-2025:02260-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for libxml2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for libxml2 fixes the following issues:\n\n- CVE-2025-49794: Fixed a heap use after free which could lead to denial of service. (bsc#1244554)\n- CVE-2025-49796: Fixed type confusion which could lead to denial of service. (bsc#1244557)\n- CVE-2025-49795: Fixed a null pointer dereference which could lead to denial of service. (bsc#1244555)\n- CVE-2025-6170: Fixed a stack buffer overflow which could lead to a crash. (bsc#1244700)\n- CVE-2025-6021: Fixed an integer overflow in xmlBuildQName() which could lead to stack buffer overflow. (bsc#1244590)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-2260,SUSE-SLE-Module-Basesystem-15-SP7-2025-2260,SUSE-SLE-Module-Python3-15-SP7-2025-2260",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02260-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:02260-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502260-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:02260-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244554",
        "url": "https://bugzilla.suse.com/1244554"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244555",
        "url": "https://bugzilla.suse.com/1244555"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244557",
        "url": "https://bugzilla.suse.com/1244557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244590",
        "url": "https://bugzilla.suse.com/1244590"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244700",
        "url": "https://bugzilla.suse.com/1244700"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-49794 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-49794/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-49795 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-49795/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-49796 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-49796/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-6021 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-6021/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-6170 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-6170/"
      }
    ],
    "title": "Security update for libxml2",
    "tracking": {
      "current_release_date": "2025-07-09T17:04:33Z",
      "generator": {
        "date": "2025-07-09T17:04:33Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:02260-1",
      "initial_release_date": "2025-07-09T17:04:33Z",
      "revision_history": [
        {
          "date": "2025-07-09T17:04:33Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-2.12.10-150700.4.3.1.aarch64",
                "product": {
                  "name": "libxml2-2-2.12.10-150700.4.3.1.aarch64",
                  "product_id": "libxml2-2-2.12.10-150700.4.3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-2.12.10-150700.4.3.1.aarch64",
                "product": {
                  "name": "libxml2-devel-2.12.10-150700.4.3.1.aarch64",
                  "product_id": "libxml2-devel-2.12.10-150700.4.3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-tools-2.12.10-150700.4.3.1.aarch64",
                "product": {
                  "name": "libxml2-tools-2.12.10-150700.4.3.1.aarch64",
                  "product_id": "libxml2-tools-2.12.10-150700.4.3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-2.12.10-150700.4.3.1.aarch64",
                "product": {
                  "name": "python3-libxml2-2.12.10-150700.4.3.1.aarch64",
                  "product_id": "python3-libxml2-2.12.10-150700.4.3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python311-libxml2-2.12.10-150700.4.3.1.aarch64",
                "product": {
                  "name": "python311-libxml2-2.12.10-150700.4.3.1.aarch64",
                  "product_id": "python311-libxml2-2.12.10-150700.4.3.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-64bit-2.12.10-150700.4.3.1.aarch64_ilp32",
                "product": {
                  "name": "libxml2-2-64bit-2.12.10-150700.4.3.1.aarch64_ilp32",
                  "product_id": "libxml2-2-64bit-2.12.10-150700.4.3.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-64bit-2.12.10-150700.4.3.1.aarch64_ilp32",
                "product": {
                  "name": "libxml2-devel-64bit-2.12.10-150700.4.3.1.aarch64_ilp32",
                  "product_id": "libxml2-devel-64bit-2.12.10-150700.4.3.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-2.12.10-150700.4.3.1.i586",
                "product": {
                  "name": "libxml2-2-2.12.10-150700.4.3.1.i586",
                  "product_id": "libxml2-2-2.12.10-150700.4.3.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-2.12.10-150700.4.3.1.i586",
                "product": {
                  "name": "libxml2-devel-2.12.10-150700.4.3.1.i586",
                  "product_id": "libxml2-devel-2.12.10-150700.4.3.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-tools-2.12.10-150700.4.3.1.i586",
                "product": {
                  "name": "libxml2-tools-2.12.10-150700.4.3.1.i586",
                  "product_id": "libxml2-tools-2.12.10-150700.4.3.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-2.12.10-150700.4.3.1.i586",
                "product": {
                  "name": "python3-libxml2-2.12.10-150700.4.3.1.i586",
                  "product_id": "python3-libxml2-2.12.10-150700.4.3.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python311-libxml2-2.12.10-150700.4.3.1.i586",
                "product": {
                  "name": "python311-libxml2-2.12.10-150700.4.3.1.i586",
                  "product_id": "python311-libxml2-2.12.10-150700.4.3.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-doc-2.12.10-150700.4.3.1.noarch",
                "product": {
                  "name": "libxml2-doc-2.12.10-150700.4.3.1.noarch",
                  "product_id": "libxml2-doc-2.12.10-150700.4.3.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-2.12.10-150700.4.3.1.ppc64le",
                "product": {
                  "name": "libxml2-2-2.12.10-150700.4.3.1.ppc64le",
                  "product_id": "libxml2-2-2.12.10-150700.4.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
                "product": {
                  "name": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
                  "product_id": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
                "product": {
                  "name": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
                  "product_id": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
                "product": {
                  "name": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
                  "product_id": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
                "product": {
                  "name": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
                  "product_id": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-2.12.10-150700.4.3.1.s390x",
                "product": {
                  "name": "libxml2-2-2.12.10-150700.4.3.1.s390x",
                  "product_id": "libxml2-2-2.12.10-150700.4.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-2.12.10-150700.4.3.1.s390x",
                "product": {
                  "name": "libxml2-devel-2.12.10-150700.4.3.1.s390x",
                  "product_id": "libxml2-devel-2.12.10-150700.4.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-tools-2.12.10-150700.4.3.1.s390x",
                "product": {
                  "name": "libxml2-tools-2.12.10-150700.4.3.1.s390x",
                  "product_id": "libxml2-tools-2.12.10-150700.4.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-2.12.10-150700.4.3.1.s390x",
                "product": {
                  "name": "python3-libxml2-2.12.10-150700.4.3.1.s390x",
                  "product_id": "python3-libxml2-2.12.10-150700.4.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python311-libxml2-2.12.10-150700.4.3.1.s390x",
                "product": {
                  "name": "python311-libxml2-2.12.10-150700.4.3.1.s390x",
                  "product_id": "python311-libxml2-2.12.10-150700.4.3.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-2-2.12.10-150700.4.3.1.x86_64",
                "product": {
                  "name": "libxml2-2-2.12.10-150700.4.3.1.x86_64",
                  "product_id": "libxml2-2-2.12.10-150700.4.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
                "product": {
                  "name": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
                  "product_id": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-2.12.10-150700.4.3.1.x86_64",
                "product": {
                  "name": "libxml2-devel-2.12.10-150700.4.3.1.x86_64",
                  "product_id": "libxml2-devel-2.12.10-150700.4.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-devel-32bit-2.12.10-150700.4.3.1.x86_64",
                "product": {
                  "name": "libxml2-devel-32bit-2.12.10-150700.4.3.1.x86_64",
                  "product_id": "libxml2-devel-32bit-2.12.10-150700.4.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-tools-2.12.10-150700.4.3.1.x86_64",
                "product": {
                  "name": "libxml2-tools-2.12.10-150700.4.3.1.x86_64",
                  "product_id": "libxml2-tools-2.12.10-150700.4.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-2.12.10-150700.4.3.1.x86_64",
                "product": {
                  "name": "python3-libxml2-2.12.10-150700.4.3.1.x86_64",
                  "product_id": "python3-libxml2-2.12.10-150700.4.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python311-libxml2-2.12.10-150700.4.3.1.x86_64",
                "product": {
                  "name": "python311-libxml2-2.12.10-150700.4.3.1.x86_64",
                  "product_id": "python311-libxml2-2.12.10-150700.4.3.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Python 3 15 SP7",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Python 3 15 SP7",
                  "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-python3:15:sp7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64"
        },
        "product_reference": "libxml2-2-2.12.10-150700.4.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le"
        },
        "product_reference": "libxml2-2-2.12.10-150700.4.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x"
        },
        "product_reference": "libxml2-2-2.12.10-150700.4.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64"
        },
        "product_reference": "libxml2-2-2.12.10-150700.4.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64"
        },
        "product_reference": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64"
        },
        "product_reference": "libxml2-devel-2.12.10-150700.4.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le"
        },
        "product_reference": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x"
        },
        "product_reference": "libxml2-devel-2.12.10-150700.4.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64"
        },
        "product_reference": "libxml2-devel-2.12.10-150700.4.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-tools-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64"
        },
        "product_reference": "libxml2-tools-2.12.10-150700.4.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le"
        },
        "product_reference": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-tools-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x"
        },
        "product_reference": "libxml2-tools-2.12.10-150700.4.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-tools-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64"
        },
        "product_reference": "libxml2-tools-2.12.10-150700.4.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64"
        },
        "product_reference": "python3-libxml2-2.12.10-150700.4.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le"
        },
        "product_reference": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x"
        },
        "product_reference": "python3-libxml2-2.12.10-150700.4.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64"
        },
        "product_reference": "python3-libxml2-2.12.10-150700.4.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-libxml2-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64"
        },
        "product_reference": "python311-libxml2-2.12.10-150700.4.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le"
        },
        "product_reference": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-libxml2-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x"
        },
        "product_reference": "python311-libxml2-2.12.10-150700.4.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python311-libxml2-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
        },
        "product_reference": "python311-libxml2-2.12.10-150700.4.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-49794",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-49794"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-49794",
          "url": "https://www.suse.com/security/cve/CVE-2025-49794"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244554 for CVE-2025-49794",
          "url": "https://bugzilla.suse.com/1244554"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-09T17:04:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-49794"
    },
    {
      "cve": "CVE-2025-49795",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-49795"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-49795",
          "url": "https://www.suse.com/security/cve/CVE-2025-49795"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244555 for CVE-2025-49795",
          "url": "https://bugzilla.suse.com/1244555"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-09T17:04:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-49795"
    },
    {
      "cve": "CVE-2025-49796",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-49796"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-49796",
          "url": "https://www.suse.com/security/cve/CVE-2025-49796"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244557 for CVE-2025-49796",
          "url": "https://bugzilla.suse.com/1244557"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-09T17:04:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-49796"
    },
    {
      "cve": "CVE-2025-6021",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-6021"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-6021",
          "url": "https://www.suse.com/security/cve/CVE-2025-6021"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244580 for CVE-2025-6021",
          "url": "https://bugzilla.suse.com/1244580"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-09T17:04:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-6021"
    },
    {
      "cve": "CVE-2025-6170",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-6170"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
          "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-6170",
          "url": "https://www.suse.com/security/cve/CVE-2025-6170"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244700 for CVE-2025-6170",
          "url": "https://bugzilla.suse.com/1244700"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-09T17:04:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-6170"
    }
  ]
}
  fkie_cve-2025-49795
Vulnerability from fkie_nvd
| Vendor | Product | Version | 
|---|
{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 una vulnerabilidad de desreferencia de puntero nulo en libxml2 al procesar expresiones XML XPath. Esta falla permite a un atacante manipular una entrada XML maliciosa en libxml2, lo que provoca una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2025-49795",
  "lastModified": "2025-10-27T18:15:41.043",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-06-16T16:15:19.203",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:10630"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:19020"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/security/cve/CVE-2025-49795"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-825"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    }
  ]
}
  msrc_cve-2025-49795
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2025-49795 Libxml: null pointer dereference leads to denial of service (dos) - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-49795.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Libxml: null pointer dereference leads to denial of service (dos)",
    "tracking": {
      "current_release_date": "2025-09-04T03:44:32.000Z",
      "generator": {
        "date": "2025-10-20T03:23:37.613Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2025-49795",
      "initial_release_date": "2025-06-02T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2025-09-04T03:44:32.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              },
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "cbl2 libxml2 2.10.4-8",
                "product": {
                  "name": "cbl2 libxml2 2.10.4-8",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version_range",
                "name": "azl3 libxml2 2.11.5-6",
                "product": {
                  "name": "azl3 libxml2 2.11.5-6",
                  "product_id": "2"
                }
              }
            ],
            "category": "product_name",
            "name": "libxml2"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 libxml2 2.10.4-8 as a component of CBL Mariner 2.0",
          "product_id": "17086-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 libxml2 2.11.5-6 as a component of Azure Linux 3.0",
          "product_id": "17084-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17084"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-49795",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "notes": [
        {
          "category": "general",
          "text": "redhat",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "known_affected": [
          "17086-1",
          "17084-2"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-49795 Libxml: null pointer dereference leads to denial of service (dos) - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-49795.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "environmentalsScore": 0.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "17086-1",
            "17084-2"
          ]
        }
      ],
      "title": "Libxml: null pointer dereference leads to denial of service (dos)"
    }
  ]
}
  ghsa-gg7j-w83p-fxr9
Vulnerability from github
A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.
{
  "affected": [],
  "aliases": [
    "CVE-2025-49795"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-825"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-06-16T16:15:19Z",
    "severity": "HIGH"
  },
  "details": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.",
  "id": "GHSA-gg7j-w83p-fxr9",
  "modified": "2025-10-27T18:31:06Z",
  "published": "2025-06-16T18:32:19Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2025:10630"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2025:19020"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2025-49795"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  wid-sec-w-2025-1312
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "libxml ist ein C Parser und Toolkit, welches f\u00fcr das Gnome Projekt entwickelt wurde.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libxml2 ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2025-1312 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1312.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2025-1312 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1312"
      },
      {
        "category": "external",
        "summary": "GNOME Security vom 2025-06-11",
        "url": "https://gitlab.gnome.org/Teams/Releng/security/-/wikis/2025"
      },
      {
        "category": "external",
        "summary": "GNOME GitLab Issue 926 vom 2025-06-11",
        "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/926"
      },
      {
        "category": "external",
        "summary": "GNOME GitLab Issue 931 vom 2025-06-11",
        "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/931"
      },
      {
        "category": "external",
        "summary": "GNOME GitLab Issue 932 vom 2025-06-11",
        "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/932"
      },
      {
        "category": "external",
        "summary": "GNOME GitLab Issue 933 vom 2025-06-11",
        "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/933"
      },
      {
        "category": "external",
        "summary": "Arch Linux Security Advisory ASA-202506-7 vom 2025-06-19",
        "url": "https://security.archlinux.org/ASA-202506-7"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2025-2893 vom 2025-06-24",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2893.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2025-2893 vom 2025-06-30",
        "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2893.html"
      },
      {
        "category": "external",
        "summary": "Tenable Security Advisory TNS-2025-13 vom 2025-06-30",
        "url": "https://de.tenable.com/security/tns-2025-13"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:10630 vom 2025-07-08",
        "url": "https://access.redhat.com/errata/RHSA-2025:10630"
      },
      {
        "category": "external",
        "summary": "openSUSE Security Update OPENSUSE-SU-2025:15321-1 vom 2025-07-09",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ENYT3VR7R5DYMOUMVW7VUSFZWAHIP53/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02260-1 vom 2025-07-09",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021778.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:10698 vom 2025-07-09",
        "url": "https://access.redhat.com/errata/RHSA-2025:10698"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:10699 vom 2025-07-09",
        "url": "https://access.redhat.com/errata/RHSA-2025:10699"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-10630 vom 2025-07-09",
        "url": "https://linux.oracle.com/errata/ELSA-2025-10630.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-10699 vom 2025-07-10",
        "url": "https://linux.oracle.com/errata/ELSA-2025-10699.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-10698 vom 2025-07-10",
        "url": "https://linux.oracle.com/errata/ELSA-2025-10698.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02275-1 vom 2025-07-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021788.html"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory NTAP-20250711-0009 vom 2025-07-11",
        "url": "https://security.netapp.com/advisory/NTAP-20250711-0009"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02294-1 vom 2025-07-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021799.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02314-1 vom 2025-07-15",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7239960 vom 2025-07-17",
        "url": "https://www.ibm.com/support/pages/node/7239960"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11386 vom 2025-07-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:11386"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02355-1 vom 2025-07-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021844.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11396 vom 2025-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2025:11396"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11580 vom 2025-07-23",
        "url": "https://access.redhat.com/errata/RHSA-2025:11580"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:11673 vom 2025-07-29",
        "url": "https://access.redhat.com/errata/RHSA-2025:11673"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12099 vom 2025-07-29",
        "url": "https://access.redhat.com/errata/RHSA-2025:12099"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12098 vom 2025-07-29",
        "url": "https://access.redhat.com/errata/RHSA-2025:12098"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12199 vom 2025-07-29",
        "url": "https://access.redhat.com/errata/RHSA-2025:12199"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12237 vom 2025-07-30",
        "url": "https://access.redhat.com/errata/RHSA-2025:12237"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12240 vom 2025-07-30",
        "url": "https://access.redhat.com/errata/RHSA-2025:12240"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12241 vom 2025-07-30",
        "url": "https://access.redhat.com/errata/RHSA-2025:12241"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12239 vom 2025-07-30",
        "url": "https://access.redhat.com/errata/RHSA-2025:12239"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2025-2938 vom 2025-07-30",
        "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2938.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-12450 vom 2025-08-01",
        "url": "https://linux.oracle.com/errata/ELSA-2025-12450.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-13203 vom 2025-08-07",
        "url": "http://linux.oracle.com/errata/ELSA-2025-13203.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7241565 vom 2025-08-06",
        "url": "https://www.ibm.com/support/pages/node/7241565"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13335 vom 2025-08-07",
        "url": "https://access.redhat.com/errata/RHSA-2025:13335"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7242015 vom 2025-08-12",
        "url": "https://www.ibm.com/support/pages/node/7242015"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13336 vom 2025-08-13",
        "url": "https://access.redhat.com/errata/RHSA-2025:13336"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13325 vom 2025-08-13",
        "url": "https://access.redhat.com/errata/RHSA-2025:13325"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-12240 vom 2025-08-14",
        "url": "https://linux.oracle.com/errata/ELSA-2025-12240.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:13289 vom 2025-08-14",
        "url": "https://access.redhat.com/errata/RHSA-2025:13289"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7694-1 vom 2025-08-20",
        "url": "https://ubuntu.com/security/notices/USN-7694-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:14059 vom 2025-08-28",
        "url": "https://access.redhat.com/errata/RHSA-2025:14059"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:14396 vom 2025-08-28",
        "url": "https://access.redhat.com/errata/RHSA-2025:14396"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20564-1 vom 2025-08-28",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20607-1 vom 2025-08-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022361.html"
      },
      {
        "category": "external",
        "summary": "PDFreactor Release Notes vom 2025-09-05",
        "url": "https://www.pdfreactor.com/pdfreactor-12-3-now-available/"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7244160 vom 2025-09-05",
        "url": "https://www.ibm.com/support/pages/node/7244160"
      },
      {
        "category": "external",
        "summary": "Hitachi Cybersecurity Advisory vom 2025-09-09",
        "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000220\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=launch"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7244361 vom 2025-09-09",
        "url": "https://www.ibm.com/support/pages/node/7244361"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:15308 vom 2025-09-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:15308"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:15827 vom 2025-09-15",
        "url": "https://access.redhat.com/errata/RHSA-2025:15827"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:15828 vom 2025-09-15",
        "url": "https://access.redhat.com/errata/RHSA-2025:15828"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:15672 vom 2025-09-18",
        "url": "https://access.redhat.com/errata/RHSA-2025:15672"
      },
      {
        "category": "external",
        "summary": "fluent-package v5.0.8 release vom 2025-10-08",
        "url": "https://www.fluentd.org/blog/fluent-package-v5.0.8-has-been-released"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:18219 vom 2025-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2025:18219"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:18217 vom 2025-10-22",
        "url": "https://access.redhat.com/errata/RHSA-2025:18217"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:18218 vom 2025-10-22",
        "url": "https://access.redhat.com/errata/RHSA-2025:18218"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:15397 vom 2025-10-22",
        "url": "https://access.redhat.com/errata/RHSA-2025:15397"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:18240 vom 2025-10-23",
        "url": "https://access.redhat.com/errata/RHSA-2025:18240"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19020 vom 2025-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2025:19020"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19046 vom 2025-10-29",
        "url": "https://access.redhat.com/errata/RHSA-2025:19046"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19041 vom 2025-10-30",
        "url": "https://access.redhat.com/errata/RHSA-2025:19041"
      }
    ],
    "source_lang": "en-US",
    "title": "libxml2: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
    "tracking": {
      "current_release_date": "2025-10-29T23:00:00.000+00:00",
      "generator": {
        "date": "2025-10-30T08:13:55.785+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2025-1312",
      "initial_release_date": "2025-06-11T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2025-06-11T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-06-12T22:00:00.000+00:00",
          "number": "2",
          "summary": "Referenz(en) aufgenommen: 2372385"
        },
        {
          "date": "2025-06-19T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Arch Linux aufgenommen"
        },
        {
          "date": "2025-06-24T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-06-30T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Amazon und Tenable aufgenommen"
        },
        {
          "date": "2025-07-08T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-09T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von openSUSE, SUSE, Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2025-07-10T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-13T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von NetApp und SUSE aufgenommen"
        },
        {
          "date": "2025-07-15T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-17T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von IBM, Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2025-07-20T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-22T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-28T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-29T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-30T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-07-31T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-08-06T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
        },
        {
          "date": "2025-08-07T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-08-11T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-08-12T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-08-13T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2025-08-19T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-27T22:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-08-31T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-09-07T22:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-09-08T22:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2025-09-09T22:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-09-11T22:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-09-15T22:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-09-17T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-07T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2025-10-16T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-21T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-23T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-27T23:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-28T23:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-29T23:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "38"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Hitachi Energy RTU500",
            "product": {
              "name": "Hitachi Energy RTU500",
              "product_id": "T027844",
              "product_identification_helper": {
                "cpe": "cpe:/h:abb:rtu500:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Hitachi Energy"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.3",
                "product": {
                  "name": "IBM AIX 7.3",
                  "product_id": "1139691",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:ibm:aix:7.3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.2",
                "product": {
                  "name": "IBM AIX 7.2",
                  "product_id": "434967",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:ibm:aix:7.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "AIX"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cLTS 12.0.14",
                "product": {
                  "name": "IBM App Connect Enterprise \u003cLTS 12.0.14",
                  "product_id": "T045928"
                }
              },
              {
                "category": "product_version",
                "name": "LTS 12.0.14",
                "product": {
                  "name": "IBM App Connect Enterprise LTS 12.0.14",
                  "product_id": "T045928-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:app_connect_enterprise:lts_12.0.14"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "App Connect Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "Operator",
                "product": {
                  "name": "IBM MQ Operator",
                  "product_id": "T036688",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:mq:operator"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container",
                "product": {
                  "name": "IBM MQ Container",
                  "product_id": "T040640",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:mq:container"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "MQ"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "V10",
                "product": {
                  "name": "IBM Power Hardware Management Console V10",
                  "product_id": "T023373",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:hardware_management_console:v10"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "V11",
                "product": {
                  "name": "IBM Power Hardware Management Console V11",
                  "product_id": "T046812",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:hardware_management_console:v11"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Power Hardware Management Console"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "for Multiplatforms 11.1",
                "product": {
                  "name": "IBM TXSeries for Multiplatforms 11.1",
                  "product_id": "T043237",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_11.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "TXSeries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3.1",
                "product": {
                  "name": "IBM VIOS 3.1",
                  "product_id": "1039165",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:vios:3.1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "4.1",
                "product": {
                  "name": "IBM VIOS 4.1",
                  "product_id": "1522854",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:vios:4.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "VIOS"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "9",
                "product": {
                  "name": "NetApp Data ONTAP 9",
                  "product_id": "T039981",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:netapp:data_ontap:9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Data ONTAP"
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source Arch Linux",
            "product": {
              "name": "Open Source Arch Linux",
              "product_id": "T013312",
              "product_identification_helper": {
                "cpe": "cpe:/o:archlinux:archlinux:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c5.0.8",
                "product": {
                  "name": "Open Source Fluentd \u003c5.0.8",
                  "product_id": "T047479"
                }
              },
              {
                "category": "product_version",
                "name": "5.0.8",
                "product": {
                  "name": "Open Source Fluentd 5.0.8",
                  "product_id": "T047479-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:fluentd:fluentd:5.0.8"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Fluentd"
          },
          {
            "category": "product_name",
            "name": "Open Source libxml2",
            "product": {
              "name": "Open Source libxml2",
              "product_id": "T044565",
              "product_identification_helper": {
                "cpe": "cpe:/a:xmlsoft:libxml2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c12.3",
                "product": {
                  "name": "RealObjects PDFreactor \u003c12.3",
                  "product_id": "T046765"
                }
              },
              {
                "category": "product_version",
                "name": "12.3",
                "product": {
                  "name": "RealObjects PDFreactor 12.3",
                  "product_id": "T046765-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:realobjects:pdfreactor:12.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PDFreactor"
          }
        ],
        "category": "vendor",
        "name": "RealObjects"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "Container Platform 4.10",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.10",
                  "product_id": "T025742",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.10"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.11",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.11",
                  "product_id": "T025990",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.11"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12",
                  "product_id": "T026435",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.16.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.16.46",
                  "product_id": "T046064"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.16.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.16.46",
                  "product_id": "T046064-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.16.46"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.18.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.18.22",
                  "product_id": "T046065"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.18.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.18.22",
                  "product_id": "T046065-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.18.22"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.14.55",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.14.55",
                  "product_id": "T046202"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.14.55",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.14.55",
                  "product_id": "T046202-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.55"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.15.57",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.15.57",
                  "product_id": "T046523"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.15.57",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.15.57",
                  "product_id": "T046523-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.15.57"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.17.38",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.17.38",
                  "product_id": "T046524"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.17.38",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.17.38",
                  "product_id": "T046524-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.17.38"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.80",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.80",
                  "product_id": "T046943"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12.80",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12.80",
                  "product_id": "T046943-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.80"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.18.27",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.18.27",
                  "product_id": "T048184"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.18.27",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.18.27",
                  "product_id": "T048184-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.18.27"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "SUSE openSUSE",
            "product": {
              "name": "SUSE openSUSE",
              "product_id": "T027843",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:opensuse:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c10.8.5",
                "product": {
                  "name": "Tenable Security Nessus \u003c10.8.5",
                  "product_id": "T044617"
                }
              },
              {
                "category": "product_version",
                "name": "10.8.5",
                "product": {
                  "name": "Tenable Security Nessus 10.8.5",
                  "product_id": "T044617-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:tenable:nessus:agent__10.8.5"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c10.9.0",
                "product": {
                  "name": "Tenable Security Nessus \u003c10.9.0",
                  "product_id": "T044956"
                }
              },
              {
                "category": "product_version",
                "name": "10.9.0",
                "product": {
                  "name": "Tenable Security Nessus 10.9.0",
                  "product_id": "T044956-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:tenable:nessus:10.9.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Nessus"
          }
        ],
        "category": "vendor",
        "name": "Tenable Security"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-49794",
      "product_status": {
        "known_affected": [
          "67646",
          "T036688",
          "T004914",
          "1139691",
          "T046812",
          "T044956",
          "398363",
          "T025990",
          "T023373",
          "434967",
          "T048184",
          "T013312",
          "1039165",
          "1522854",
          "T044617",
          "T045928",
          "T039981",
          "T046943",
          "T044565",
          "T046523",
          "T046765",
          "T043237",
          "T046524",
          "T002207",
          "T000126",
          "T027843",
          "T027844",
          "T046064",
          "T025742",
          "T026435",
          "T046065",
          "T046202",
          "T040640",
          "T047479"
        ]
      },
      "release_date": "2025-06-11T22:00:00.000+00:00",
      "title": "CVE-2025-49794"
    },
    {
      "cve": "CVE-2025-49795",
      "product_status": {
        "known_affected": [
          "67646",
          "T036688",
          "T004914",
          "1139691",
          "T046812",
          "T044956",
          "398363",
          "T025990",
          "T023373",
          "434967",
          "T048184",
          "T013312",
          "1039165",
          "1522854",
          "T044617",
          "T045928",
          "T039981",
          "T046943",
          "T044565",
          "T046523",
          "T046765",
          "T043237",
          "T046524",
          "T002207",
          "T000126",
          "T027843",
          "T027844",
          "T046064",
          "T025742",
          "T026435",
          "T046065",
          "T046202",
          "T040640",
          "T047479"
        ]
      },
      "release_date": "2025-06-11T22:00:00.000+00:00",
      "title": "CVE-2025-49795"
    },
    {
      "cve": "CVE-2025-49796",
      "product_status": {
        "known_affected": [
          "67646",
          "T036688",
          "T004914",
          "1139691",
          "T046812",
          "T044956",
          "398363",
          "T025990",
          "T023373",
          "434967",
          "T048184",
          "T013312",
          "1039165",
          "1522854",
          "T044617",
          "T045928",
          "T039981",
          "T046943",
          "T044565",
          "T046523",
          "T046765",
          "T043237",
          "T046524",
          "T002207",
          "T000126",
          "T027843",
          "T027844",
          "T046064",
          "T025742",
          "T026435",
          "T046065",
          "T046202",
          "T040640",
          "T047479"
        ]
      },
      "release_date": "2025-06-11T22:00:00.000+00:00",
      "title": "CVE-2025-49796"
    },
    {
      "cve": "CVE-2025-6021",
      "product_status": {
        "known_affected": [
          "67646",
          "T036688",
          "T004914",
          "1139691",
          "T046812",
          "T044956",
          "398363",
          "T025990",
          "T023373",
          "434967",
          "T048184",
          "T013312",
          "1039165",
          "1522854",
          "T044617",
          "T045928",
          "T039981",
          "T046943",
          "T044565",
          "T046523",
          "T046765",
          "T043237",
          "T046524",
          "T002207",
          "T000126",
          "T027843",
          "T027844",
          "T046064",
          "T025742",
          "T026435",
          "T046065",
          "T046202",
          "T040640",
          "T047479"
        ]
      },
      "release_date": "2025-06-11T22:00:00.000+00:00",
      "title": "CVE-2025-6021"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.